Skip to navigation

Bug Fix Advisory up2date bug fix update

Advisory: RHBA-2007:1105-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2007-12-04
Last updated on: 2007-12-04
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.6.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.6.z)
Red Hat Enterprise Linux WS (v. 4)

Details

Updated up2date packages that fix a bug are now available.

The Red Hat Update Agent automatically queries the Red Hat Network
(RHN) servers and determines which packages need to be updated on your
machine.

In failover setups, up2date would fail if the "noSSLServerURL",
"serverURL", or "sslCACert" options in "/etc/sysconfig/rhn/up2date" had a
trailing ";". Systems could not be updated using up2date. A trailing ";" no
longer causes up2date to fail.

All up2date users are advised to upgrade to these updated packages, which
resolve this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 4)

IA-32:
up2date-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: c882ece4a7582d1a46786692fd0acee7
up2date-gnome-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: dcde2d05778ab6950888792a4b1aad81
 
x86_64:
up2date-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 4554ecafe87d67d4b35bcb559b1f168f
up2date-gnome-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: fc8742a88fd9b5ac0d8481452b7d5a74
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
up2date-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: c882ece4a7582d1a46786692fd0acee7
up2date-gnome-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: dcde2d05778ab6950888792a4b1aad81
 
IA-64:
up2date-4.6.2-7.el4_6.1.ia64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 33754f34d5969f36c70904ce774055a1
up2date-gnome-4.6.2-7.el4_6.1.ia64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 6b3a106eb1b5622e5edafdfd171a0767
 
PPC:
up2date-4.6.2-7.el4_6.1.ppc.rpm
File outdated by:  RHEA-2012:0098
    MD5: c48b048ce00abdcff7cf708cc1b895c7
up2date-gnome-4.6.2-7.el4_6.1.ppc.rpm
File outdated by:  RHEA-2012:0098
    MD5: cf116dd5c42f9796c776d43556dc0fe1
 
s390:
up2date-4.6.2-7.el4_6.1.s390.rpm
File outdated by:  RHEA-2012:0098
    MD5: ca6132750d3957191090fc24735eca33
up2date-gnome-4.6.2-7.el4_6.1.s390.rpm
File outdated by:  RHEA-2012:0098
    MD5: 81b4944de0a3ec0beba71762afc28c74
 
s390x:
up2date-4.6.2-7.el4_6.1.s390x.rpm
File outdated by:  RHEA-2012:0098
    MD5: 43721a0eba81b4bf28e4d8b19b110e23
up2date-gnome-4.6.2-7.el4_6.1.s390x.rpm
File outdated by:  RHEA-2012:0098
    MD5: f883be40525ed0d807af0f3a32bb0916
 
x86_64:
up2date-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 4554ecafe87d67d4b35bcb559b1f168f
up2date-gnome-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: fc8742a88fd9b5ac0d8481452b7d5a74
 
Red Hat Enterprise Linux AS (v. 4.6.z)

IA-32:
up2date-4.6.2-7.el4_6.1.i386.rpm     MD5: c882ece4a7582d1a46786692fd0acee7
up2date-gnome-4.6.2-7.el4_6.1.i386.rpm     MD5: dcde2d05778ab6950888792a4b1aad81
 
IA-64:
up2date-4.6.2-7.el4_6.1.ia64.rpm     MD5: 33754f34d5969f36c70904ce774055a1
up2date-gnome-4.6.2-7.el4_6.1.ia64.rpm     MD5: 6b3a106eb1b5622e5edafdfd171a0767
 
PPC:
up2date-4.6.2-7.el4_6.1.ppc.rpm     MD5: c48b048ce00abdcff7cf708cc1b895c7
up2date-gnome-4.6.2-7.el4_6.1.ppc.rpm     MD5: cf116dd5c42f9796c776d43556dc0fe1
 
s390:
up2date-4.6.2-7.el4_6.1.s390.rpm     MD5: ca6132750d3957191090fc24735eca33
up2date-gnome-4.6.2-7.el4_6.1.s390.rpm     MD5: 81b4944de0a3ec0beba71762afc28c74
 
s390x:
up2date-4.6.2-7.el4_6.1.s390x.rpm     MD5: 43721a0eba81b4bf28e4d8b19b110e23
up2date-gnome-4.6.2-7.el4_6.1.s390x.rpm     MD5: f883be40525ed0d807af0f3a32bb0916
 
x86_64:
up2date-4.6.2-7.el4_6.1.x86_64.rpm     MD5: 4554ecafe87d67d4b35bcb559b1f168f
up2date-gnome-4.6.2-7.el4_6.1.x86_64.rpm     MD5: fc8742a88fd9b5ac0d8481452b7d5a74
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
up2date-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: c882ece4a7582d1a46786692fd0acee7
up2date-gnome-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: dcde2d05778ab6950888792a4b1aad81
 
IA-64:
up2date-4.6.2-7.el4_6.1.ia64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 33754f34d5969f36c70904ce774055a1
up2date-gnome-4.6.2-7.el4_6.1.ia64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 6b3a106eb1b5622e5edafdfd171a0767
 
x86_64:
up2date-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 4554ecafe87d67d4b35bcb559b1f168f
up2date-gnome-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: fc8742a88fd9b5ac0d8481452b7d5a74
 
Red Hat Enterprise Linux ES (v. 4.6.z)

IA-32:
up2date-4.6.2-7.el4_6.1.i386.rpm     MD5: c882ece4a7582d1a46786692fd0acee7
up2date-gnome-4.6.2-7.el4_6.1.i386.rpm     MD5: dcde2d05778ab6950888792a4b1aad81
 
IA-64:
up2date-4.6.2-7.el4_6.1.ia64.rpm     MD5: 33754f34d5969f36c70904ce774055a1
up2date-gnome-4.6.2-7.el4_6.1.ia64.rpm     MD5: 6b3a106eb1b5622e5edafdfd171a0767
 
x86_64:
up2date-4.6.2-7.el4_6.1.x86_64.rpm     MD5: 4554ecafe87d67d4b35bcb559b1f168f
up2date-gnome-4.6.2-7.el4_6.1.x86_64.rpm     MD5: fc8742a88fd9b5ac0d8481452b7d5a74
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
up2date-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: c882ece4a7582d1a46786692fd0acee7
up2date-gnome-4.6.2-7.el4_6.1.i386.rpm
File outdated by:  RHEA-2012:0098
    MD5: dcde2d05778ab6950888792a4b1aad81
 
IA-64:
up2date-4.6.2-7.el4_6.1.ia64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 33754f34d5969f36c70904ce774055a1
up2date-gnome-4.6.2-7.el4_6.1.ia64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 6b3a106eb1b5622e5edafdfd171a0767
 
x86_64:
up2date-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: 4554ecafe87d67d4b35bcb559b1f168f
up2date-gnome-4.6.2-7.el4_6.1.x86_64.rpm
File outdated by:  RHEA-2012:0098
    MD5: fc8742a88fd9b5ac0d8481452b7d5a74
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

404871 - trailing ";" with sslCACert causes up2date breakage on failover setup



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/