- Issued:
- 2015-06-01
- Updated:
- 2015-06-01
RHBA-2015:1040 - Bug Fix Advisory
Synopsis
Red Hat Satellite bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated spacewalk-java, spacewalk-utils, satellite-schema, satellite-branding,
cobbler, and spacecmd packages that fix several bugs are now available for Red
Hat Satellite 5.7.
Description
Red Hat Satellite is a systems management tool for Linux-based infrastructures.
It allows for provisioning, remote management and monitoring of multiple Linux
deployments with a single, centralized tool.
This update fixes the following bugs:
- Updating Satellite with the kickstart.profile.setKickstarttableTree API call
did not correctly recreate the kickstart file. Consequently, until another
change was made in the file, the systems kickstarted through the API used an
outdated kickstart tree. With this update, the changes of the kickstart tree are
effective immediately. (BZ#1086354)
- Previously in Satellite 5.7, the "Update" button on the administration page of
a system group was inactive. Consequently, it was not possible to change the
system group administrators from that page. This bug has been fixes, and the
"Update" button now works as expected. (BZ#1202233)
- The "asynchronous" cloning option of the "spacewalk-clone-by-date" command did
not function correctly with improved recursive dependency resolution.
Consequently, the "max recursion depth exceeded" error message was returned if
the asynchronous cloning took a long time. This update removes the asynchronous
option, as it is no longer necessary given the improved cloning speeds and the
recent dependency resolution improvements. (BZ#1208228)
- In certain cases, using the "spacecmd package_details" command to view the
details about a package returned duplicate results. This update ensures that the
results returned by "spacecmd package_details" are unique. (BZ#1207606)
- Kickstart scripts are required to have a name since Satellite version 5.5.
However, nameless scripts could occur if the Satellite has been upgraded from
version 5.4 without updating the scripts. Because Satellite 5.7 uses the script
name as the visible text for the link to the script's details, there was no way
to view the details of unnamed scripts. This update ensures that a generic
"Script" name is used in the link if the script does not have a name.
(BZ#1188586)
- Kickstart scripts containing non-ascii characters caused the cobbler utility
to return the "ordinal not in range" error when attempting to use the Kickstart
profile. This update ensures that all UTF-8 characters are usable in Kickstart
scripts. (BZ#1096263)
- Due to a small timing window in the cobbler utility, directories and files
were sometimes created with incorrect permissions, causing PXE installation to
fail. With this update, the PXE installation no longer fails due to incorrect
file permissions. (BZ#1052857)
- Previously in Satellite 5.7, loading the Systems Overview page could take a
very long time if the systems had a large number of applicable errata. This
update significantly improves the loading speed of that page. (BZ#1207816)
- Previously in 5.7, the page that shows the results of a configuration file
diff action was very difficult to read due to a bug in the CSS of the page. This
bug has been fixed and the page is now rendered properly. (BZ#1189354)
- Under certain circumstances, Auto Errata Updates were not correctly scheduled
for example when publishing a previously unpublished erratum. This update
changes the scheduling of Auto Errata Updates, moving it into a separate
Taskomatic task. As a result, Auto Errata Updates are now properly scheduled
when they are available. (BZ#1215671)
- Previously in Satellite 5.7, scheduling a Remote Command in the System Set
Manager page took a long time if the system set was large. This update
significantly improves the performance of System Set Manager. (BZ#1215271)
- Assigning an errata to a custom channel failed for Satellite Servers using an
Oracle database. This bug has been fixed and errata can now be associated with
custom channels without complications. (BZ#1221717)
Users of Red Hat Satellite are advised to upgrade to these updated packages,
which fix these bugs.
Solution
Application of this errata involves updating the database schema.
For general instructions on database schema upgrade, consult the
following document first: https://access.redhat.com/site/articles/273633
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. To apply this erratum, take
the following steps:
- Shut down Red Hat Satellite by running the following as
root:
rhn-satellite stop
- Backup the database. For embedded or managed database variants, please
consult Red Hat Satellite 5.7 documentation.
For an external database, consult your database administrator.
- Upgrade the errata packages available via Red Hat Network. Details
on how to use Red Hat Network to apply this update are available
at https://access.redhat.com/site/articles/11258
- Update the database schema using the spacewalk-schema-upgrade
command. To do so, run as root:
spacewalk-schema-upgrade
This process will update your database schema to the latest version.
The spacewalk-schema-upgrade command will inform you about the
results of the upgrade and exact locations of schema upgrade log
files.
- Restart Red Hat Satellite by running the following as root:
rhn-satellite start
Affected Products
- Red Hat Satellite 5.7 x86_64
- Red Hat Satellite 5.7 s390x
Fixes
- BZ - 1188586 - After upgrade ks profile script are not visible
- BZ - 1189354 - Compare two versions of a configuration file
- BZ - 1202233 - system group admin update button unclickable
- BZ - 1215671 - not all erratas scheduled for systems with Auto Errata Update enabled when cloning these erratas via Errata -> Clone Errata
CVEs
(none)
References
(none)
Red Hat Satellite 5.7
SRPM | |
---|---|
cobbler-2.0.7-56.el6sat.src.rpm | SHA-256: e95b6d54cd9972e9f33211f2804842963422f1eac2ad4b11769274b81ef1041d |
satellite-branding-5.7.0.26-1.el6sat.src.rpm | SHA-256: 884e71f9e3a60fa8b0f2763b6620b1e9c0cede461fae71d4edf9f7eeb488cb6a |
satellite-schema-5.7.0.15-1.el6sat.src.rpm | SHA-256: eb10806d32fce16e4d1d195335edab41d77c5d0d580e4203229f462f8b64b871 |
spacecmd-2.3.0-4.el6sat.src.rpm | SHA-256: c807b778db13afb70062531ad180e2d0fd0d91915880a9858e8975839dcbc7a1 |
spacewalk-java-2.3.8-105.el6sat.src.rpm | SHA-256: 2574e973f3eea6202c02be5ac1c761134f3e5839a18bdaa05744d1146878cf07 |
spacewalk-schema-2.3.2-17.el6sat.src.rpm | SHA-256: 126d36900824c40a7655f69c7270d2968af7c39473ff5f35e0c93c7ec72ff3bf |
spacewalk-utils-2.3.2-18.el6sat.src.rpm | SHA-256: 409595cb5517f03c0b847211d6e66a3cbefef661468f6bfddae5cc84f897149f |
x86_64 | |
cobbler-2.0.7-56.el6sat.noarch.rpm | SHA-256: c8c534c7d3695a28a620d9dd17babc03bfb5ed117421267058b0fc1fe52a0f7d |
satellite-branding-5.7.0.26-1.el6sat.noarch.rpm | SHA-256: e4482ad2e61be7235e795171663ac7c78936bcb7d87eb2cf22cca6d5c7adf07e |
satellite-schema-5.7.0.15-1.el6sat.noarch.rpm | SHA-256: 172dae7f8322971b9337b767bc57db3afb63d6361f41e9f4214086d0179f9bc6 |
spacecmd-2.3.0-4.el6sat.noarch.rpm | SHA-256: 3212f8899a13c13bdc0802a453bfd8b8b10564b3cd56ac84f4d410cb24db3865 |
spacewalk-java-2.3.8-105.el6sat.noarch.rpm | SHA-256: fe47b29d2af6ad368a09ce989601ff41650f09b90527d8c8d1f153baa869d2a7 |
spacewalk-java-config-2.3.8-105.el6sat.noarch.rpm | SHA-256: b6a7d07515ea37aa689654ce8830edb665234822b5faf4824e3da5681fb3468d |
spacewalk-java-lib-2.3.8-105.el6sat.noarch.rpm | SHA-256: d06105284606b3a8b783d422c5192f2c4d6df4c7fd4a2330f086d682452682a2 |
spacewalk-java-oracle-2.3.8-105.el6sat.noarch.rpm | SHA-256: ac189e83d5ee8c35a44ccca0ccd7a638f7f49d602d3fa8631c842cbbb22cd495 |
spacewalk-java-postgresql-2.3.8-105.el6sat.noarch.rpm | SHA-256: 30ddffaabb8f3c032b96a34a6560899e1f0bd7a7363c4b6b0dae9874f2e35381 |
spacewalk-schema-2.3.2-17.el6sat.noarch.rpm | SHA-256: ae83e6cb5445d885cd446f16dbdf2efaef9fe271888b7c8468076bbc63354814 |
spacewalk-taskomatic-2.3.8-105.el6sat.noarch.rpm | SHA-256: 43c9b04c4dac573370bc8645ca76897b03973a7432eb762693e39475b6391a28 |
spacewalk-utils-2.3.2-18.el6sat.noarch.rpm | SHA-256: 0e2518ca7731f6875f3d2cf5ad858fc23b395d2a350bd36eb0a54d002166fae4 |
s390x | |
cobbler-2.0.7-56.el6sat.noarch.rpm | SHA-256: c8c534c7d3695a28a620d9dd17babc03bfb5ed117421267058b0fc1fe52a0f7d |
satellite-branding-5.7.0.26-1.el6sat.noarch.rpm | SHA-256: e4482ad2e61be7235e795171663ac7c78936bcb7d87eb2cf22cca6d5c7adf07e |
satellite-schema-5.7.0.15-1.el6sat.noarch.rpm | SHA-256: 172dae7f8322971b9337b767bc57db3afb63d6361f41e9f4214086d0179f9bc6 |
spacecmd-2.3.0-4.el6sat.noarch.rpm | SHA-256: 3212f8899a13c13bdc0802a453bfd8b8b10564b3cd56ac84f4d410cb24db3865 |
spacewalk-java-2.3.8-105.el6sat.noarch.rpm | SHA-256: fe47b29d2af6ad368a09ce989601ff41650f09b90527d8c8d1f153baa869d2a7 |
spacewalk-java-config-2.3.8-105.el6sat.noarch.rpm | SHA-256: b6a7d07515ea37aa689654ce8830edb665234822b5faf4824e3da5681fb3468d |
spacewalk-java-lib-2.3.8-105.el6sat.noarch.rpm | SHA-256: d06105284606b3a8b783d422c5192f2c4d6df4c7fd4a2330f086d682452682a2 |
spacewalk-java-oracle-2.3.8-105.el6sat.noarch.rpm | SHA-256: ac189e83d5ee8c35a44ccca0ccd7a638f7f49d602d3fa8631c842cbbb22cd495 |
spacewalk-java-postgresql-2.3.8-105.el6sat.noarch.rpm | SHA-256: 30ddffaabb8f3c032b96a34a6560899e1f0bd7a7363c4b6b0dae9874f2e35381 |
spacewalk-schema-2.3.2-17.el6sat.noarch.rpm | SHA-256: ae83e6cb5445d885cd446f16dbdf2efaef9fe271888b7c8468076bbc63354814 |
spacewalk-taskomatic-2.3.8-105.el6sat.noarch.rpm | SHA-256: 43c9b04c4dac573370bc8645ca76897b03973a7432eb762693e39475b6391a28 |
spacewalk-utils-2.3.2-18.el6sat.noarch.rpm | SHA-256: 0e2518ca7731f6875f3d2cf5ad858fc23b395d2a350bd36eb0a54d002166fae4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.