- Issued:
- 2007-06-11
- Updated:
- 2007-06-11
RHBA-2007:0439 - Bug Fix Advisory
Synopsis
up2date bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated up2date packages that fix various bugs are now available.
Description
The Red Hat Update Agent automatically queries the Red Hat Network servers
and determines which packages need to be updated on your machine.
These updated packages include the following bug fixes:
- up2date correctly downloads and installs packages with activation key.
- up2date skips packages correctly from skip list.
- rhn_check correctly kickstarts the system to right version.
- up2date deals correctly with comps.
- rhn_register TUI works on a para-virt guest environment.
- rhn_register GUI works on a virt guest environment.
- rhn_check includes fix for %pre scriptlet failure with error logging.
- a policycoreutils dependency was fixed.
- up2date identifies fully virt guests.
- rhn_check checks and avoids multiple instances.
- fix for rhn_check to dep solver.
- up2date fixed for --arch.
- rhn_check scheduled updates install selected (and not latest) package.
- up2date deprecates --list-rollbacks option.
- TUI now detects if the system has entitlements.
- the user is warned if hardware or package profile sending fails, but
process continues on.
- probable fix to retrieve BIOS information; applied patch from Kyle
Powell, which fixes dmi reading on all machines available for testing.
- up2date --configure option runs only when asked.
- up2date sees multilib packages in dir repo.
- up2date --show-available for i386 on x86_64 fixed.
- up2date man pages include rhn_register and rhn_check.
- up2date fix for 'return and leave job in background' issue.
- rhnsd fix for 'spawn child processes with SIGPIPE set to SIG_IGN' issue.
Users are advised to upgrade to these updated up2date packages, which
resolve these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 3 x86_64
- Red Hat Enterprise Linux Server 3 ia64
- Red Hat Enterprise Linux Server 3 i386
- Red Hat Enterprise Linux Workstation 3 x86_64
- Red Hat Enterprise Linux Workstation 3 ia64
- Red Hat Enterprise Linux Workstation 3 i386
- Red Hat Enterprise Linux Desktop 3 x86_64
- Red Hat Enterprise Linux Desktop 3 i386
- Red Hat Enterprise Linux for IBM z Systems 3 s390x
- Red Hat Enterprise Linux for IBM z Systems 3 s390
- Red Hat Enterprise Linux for Power, big endian 3 ppc
Fixes
- BZ - 185554 - up2date '@ GNOME Desktop Environment' defaults to up2date -u and backgrounds itself
- BZ - 218628 - RHN scheduled update installs latest package not the selected one
- BZ - 218630 - manual page of up2date does not mention rhn_regiser and rhn_check
- BZ - 218636 - runTransaction doesn't dependency solve, which can break sync's to profiles on x86_64
- BZ - 218639 - rhn_register - unable to send hardware profile in RHEL4
- BZ - 218647 - up2date --arch doesn't adequately take into account obsoletes (or something)
- BZ - 218651 - rhnsd spawns children with SIGPIPE set to SIG_IGN
- BZ - 218654 - up2date does not "see" multilib packages in "dir" repos
- BZ - 218657 - up2date return before updating is completed, leaving background job
- BZ - 218658 - up2date runs --configure on first run even when not requested
- BZ - 239808 - up2date not downloading packages as specified by activation key
- BZ - 240201 - [PATCH] rhn_check reports success if %pre scriptlet fail with exit 1
- BZ - 240203 - up2date depends on policycoreutils but doesn't enforce it.
- BZ - 240204 - rhn_register TUI fails in a para-virt guest environment
- BZ - 240205 - rhn_register GUI fails in a virt guest
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.