Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2008:0771 - Bug Fix Advisory
Issued:
2008-07-24
Updated:
2008-07-24

RHBA-2008:0771 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

up2date bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated up2date packages that fix several bugs are now available.

Description

The Red Hat Update Agent automatically queries Red Hat Network (RHN)
servers to determine which packages need to be updated on your system.

These updated packages fix the following bugs:

  • registering with a universal default activation key (with no entitlements

left), caused an "error code 91: red hat software management exhausted"
error.

  • rhn_check did not have a consistent environment with "osad" and "rhnsd",

which was seen by the "env" command. This may have caused failures.

  • after installing Red Hat Enterprise Linux 4 on AMD64 or Intel® 64

systems, running up2date with the "--arch=[arch]" option failed with a
"package [package] is already installed" error. The up2date man page has
been updated to describe the "--arch" option.

  • package removal failed if the package had dependencies. Now, rhn_check

checks and removes dependencies.

  • after running the "service rhnsd reload" command, the "service rhnsd

status" command returned "rhnsd dead but pid file exists".

  • rhn_check sent incorrect response codes back to servers. For example,

"%pre" and "%post" failures caused incorrect "Failed: packages requested
raised dependency problems" errors.

  • the registration window incorrectly referenced "Red Hat Enterprise Linux

5", instead of "Red Hat Enterprise Linux 4".

  • in failover environments, up2date failed if the "noSSLServerURL",

"serverURL", or "sslCACert" options in "/etc/sysconfig/rhn/up2date" had a
trailing ";". Systems could not be updated using up2date. A trailing ";" no
longer causes up2date to fail.

  • a pop-up notice did not occur when using rhn_register to register an

account -- that had no entitlements -- for Extended Update Support (EUS),
causing rhn_register to crash.

  • using up2date to install updates may have caused "WARNING **: unknown

property" warnings.

  • the "up2date --show-groups" command did not show any output when run on

64-bit PowerPC and IBM® System z systems.

  • when using up2date with a yum repository, "getPackage" was called twice,

causing duplicate "[package-name] Retrieved" messages, when the package
was being installed, upgraded, or downloaded, for the first time.

  • on Dell™ PowerEdge™ 1950 and 1955 systems, running "up2date --hardware"

caused "Reading DMI info failed" errors.

  • up2date sometimes failed to install or update the "kernel-smp" package.
  • using rhnreg_ks with activation keys to register a system failed.
  • running "up2date -i" on a large RPM, for example, larger than 2 GB,

caused an "exceptions.OverflowError" error.

  • snapshot rollbacks failed with a "Failed: packages requested raised

dependency problems" error.

  • during Red Hat Enterprise Linux upgrades, when a system was subscribed to

the main and beta channels, up2date tried to install the latest package
version from each channel.

  • there was no paragraph break between the "--arch" and "--help" options in

the up2date man page.

  • on certain hardware, running "up2date --hardware" caused "Error reading

DMI information" errors.

As well, the account creation capability has been removed from the
rhn_register GUI and TUI. Users are now instructed to go to
"https://rhn.redhat.com/rhn/sales/LoginInfo.do" for account creation.

Users of up2date are advised to upgrade to these updated packages, which
resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 299861 - Package removals via rhn_check fail if there are dependencies
  • BZ - 385161 - trailing ";" with sslCACert causes up2date breakage on failover setup
  • BZ - 401321 - up2date: warning messages seen during update
  • BZ - 430151 - remove account creation capability from rhn_register GUI
  • BZ - 430153 - remove account creation capability from rhn_register TUI
  • BZ - 434168 - exceptions.OverflowError when up2date'ing rpm bigger than 2GB
  • BZ - 447407 - up2date tries to install never packages from main and beta channels
  • BZ - 449743 - man page --arch and --help in one paragraph
  • BZ - 450082 - up2date --show-groups does not work for s390x
  • BZ - 450253 - missing newline after `service rhnsd reload`
  • BZ - 450529 - up2date --hardware throws error "Reading DMI info failed"
  • BZ - 451177 - wrong newlines when downloading packages
  • BZ - 451194 - rhn_register GUI - incorrect description
  • BZ - 451617 - rhn_register TUI looks like it can be used for user registration
  • BZ - 452089 - rhn_register fails, error has occurred: exceptions.ImportError

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
up2date-4.7.1-17.el4.src.rpm SHA-256: 493fdd267ac568206b54b5d127fad8c3ec200d610beae53305f0ae16719bb4a9
x86_64
up2date-4.7.1-17.el4.x86_64.rpm SHA-256: e91fecffbc5b356b6306b215c0e639fbee51c9b49cfc52aa723e317568ef289f
up2date-4.7.1-17.el4.x86_64.rpm SHA-256: e91fecffbc5b356b6306b215c0e639fbee51c9b49cfc52aa723e317568ef289f
up2date-gnome-4.7.1-17.el4.x86_64.rpm SHA-256: 9502472dbbf59866fb20a18c4e94c43cfee8e9d079e25e1e656a91cd8e779af0
up2date-gnome-4.7.1-17.el4.x86_64.rpm SHA-256: 9502472dbbf59866fb20a18c4e94c43cfee8e9d079e25e1e656a91cd8e779af0
ia64
up2date-4.7.1-17.el4.ia64.rpm SHA-256: f12c5ba725becb9441bcbbfa75daa18dfab73c8e1f58db82379691ae489dbd12
up2date-4.7.1-17.el4.ia64.rpm SHA-256: f12c5ba725becb9441bcbbfa75daa18dfab73c8e1f58db82379691ae489dbd12
up2date-gnome-4.7.1-17.el4.ia64.rpm SHA-256: 2c93e297e083075f0445811e4516b5a6b536de58a3c83dda02e4a040502338f4
up2date-gnome-4.7.1-17.el4.ia64.rpm SHA-256: 2c93e297e083075f0445811e4516b5a6b536de58a3c83dda02e4a040502338f4
i386
up2date-4.7.1-17.el4.i386.rpm SHA-256: f69b949fb1908d403482d7e3bfc3875ac3aeb2a310dfa1b145a7c9d1dbc40d12
up2date-4.7.1-17.el4.i386.rpm SHA-256: f69b949fb1908d403482d7e3bfc3875ac3aeb2a310dfa1b145a7c9d1dbc40d12
up2date-gnome-4.7.1-17.el4.i386.rpm SHA-256: 8746c5945d70d4add95f58fab7ecbe13b2bcf7bce9195265fdaa2d1e024f3d4d
up2date-gnome-4.7.1-17.el4.i386.rpm SHA-256: 8746c5945d70d4add95f58fab7ecbe13b2bcf7bce9195265fdaa2d1e024f3d4d

Red Hat Enterprise Linux Workstation 4

SRPM
up2date-4.7.1-17.el4.src.rpm SHA-256: 493fdd267ac568206b54b5d127fad8c3ec200d610beae53305f0ae16719bb4a9
x86_64
up2date-4.7.1-17.el4.x86_64.rpm SHA-256: e91fecffbc5b356b6306b215c0e639fbee51c9b49cfc52aa723e317568ef289f
up2date-gnome-4.7.1-17.el4.x86_64.rpm SHA-256: 9502472dbbf59866fb20a18c4e94c43cfee8e9d079e25e1e656a91cd8e779af0
ia64
up2date-4.7.1-17.el4.ia64.rpm SHA-256: f12c5ba725becb9441bcbbfa75daa18dfab73c8e1f58db82379691ae489dbd12
up2date-gnome-4.7.1-17.el4.ia64.rpm SHA-256: 2c93e297e083075f0445811e4516b5a6b536de58a3c83dda02e4a040502338f4
i386
up2date-4.7.1-17.el4.i386.rpm SHA-256: f69b949fb1908d403482d7e3bfc3875ac3aeb2a310dfa1b145a7c9d1dbc40d12
up2date-gnome-4.7.1-17.el4.i386.rpm SHA-256: 8746c5945d70d4add95f58fab7ecbe13b2bcf7bce9195265fdaa2d1e024f3d4d

Red Hat Enterprise Linux Desktop 4

SRPM
up2date-4.7.1-17.el4.src.rpm SHA-256: 493fdd267ac568206b54b5d127fad8c3ec200d610beae53305f0ae16719bb4a9
x86_64
up2date-4.7.1-17.el4.x86_64.rpm SHA-256: e91fecffbc5b356b6306b215c0e639fbee51c9b49cfc52aa723e317568ef289f
up2date-gnome-4.7.1-17.el4.x86_64.rpm SHA-256: 9502472dbbf59866fb20a18c4e94c43cfee8e9d079e25e1e656a91cd8e779af0
i386
up2date-4.7.1-17.el4.i386.rpm SHA-256: f69b949fb1908d403482d7e3bfc3875ac3aeb2a310dfa1b145a7c9d1dbc40d12
up2date-gnome-4.7.1-17.el4.i386.rpm SHA-256: 8746c5945d70d4add95f58fab7ecbe13b2bcf7bce9195265fdaa2d1e024f3d4d

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
up2date-4.7.1-17.el4.src.rpm SHA-256: 493fdd267ac568206b54b5d127fad8c3ec200d610beae53305f0ae16719bb4a9
s390x
up2date-4.7.1-17.el4.s390x.rpm SHA-256: 3d12899394c6fb6ad4c9bf3737dfe17b00509d129d12cf98544cfd5c9ea759d5
up2date-gnome-4.7.1-17.el4.s390x.rpm SHA-256: afd0a680a038cf30f66fe4bfba86164b44d02cd5ea1112dc1c48926347d75549
s390
up2date-4.7.1-17.el4.s390.rpm SHA-256: 2bcca82e46ebdb25e126400a95309948675d996d885ca078fe18b418c08fc21f
up2date-gnome-4.7.1-17.el4.s390.rpm SHA-256: b5296cb114ef8c0ff4658236b0a8e622741da14d2257e2f492df0a56ad24b50a

Red Hat Enterprise Linux for Power, big endian 4

SRPM
up2date-4.7.1-17.el4.src.rpm SHA-256: 493fdd267ac568206b54b5d127fad8c3ec200d610beae53305f0ae16719bb4a9
ppc
up2date-4.7.1-17.el4.ppc.rpm SHA-256: dab5600c4e823e6d23c7d5533b9c7e9f2f046102d4b78cfa97ceda2ce9833167
up2date-gnome-4.7.1-17.el4.ppc.rpm SHA-256: 731683a0cea2326b10418c636ccd48b022612405e5a2989aaf675df6f4f79381

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility