- Issued:
- 2015-08-26
- Updated:
- 2015-08-26
RHBA-2015:1688 - Bug Fix Advisory
Synopsis
Satellite 6.1 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Satellite 6.1 packages that fix several bugs are now available.
Description
Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without needing to provide public
Internet access to their servers or other client systems. It performs
provisioning and configuration management of predefined standard operating
environments.
This update fixes the following bugs:
- When some customers attempted to upgrade to Satellite 6.1.1 from
version 6.0.8 or version 6.0, the upgrade failed with the following
error message:
error: wrong number of arguments (7 for 1) (ArgumentError)
This error was caused by inconsistent data between the Satellite database
and the pulp database. This update modifies the installer and upgrade code
so that these inconsistencies are handled correctly. (BZ#1213000)
- When customers using Red Hat Enterprise Linux 6 attempted to upgrade to
Satellite 6.1.1 from version 6.0.Z, they encountered the following warning
when the system attempted to stop the Tomcat process:
Stopping tomcat6: waiting for processes 2787 to exit
killing 2787 which did not stop after 60 seconds [WARNING]
The condition that caused this warning to appear has been corrected.
(BZ#1253432)
- Previously, the 'Customer Portal Username/Password' fields under
Access Insights > Manage were treated as mandatory. These fields do not
need to be mandatory. This update makes these fields optional. (BZ#1254252)
Users of Red Hat Satellite are advised to upgrade to these updated packages,
which fix these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update this system to include these fixes ensure your system has access to the latest Red Hat packages:
https://access.redhat.com/articles/11258
then run:
# yum update
and re-run the installer to complete the upgrade:
# katello-installer --upgrade
Affected Products
- Red Hat Satellite 6.1 for RHEL 7 x86_64
- Red Hat Satellite 6.1 for RHEL 6 x86_64
- Red Hat Satellite Capsule 6.1 for RHEL 7 x86_64
- Red Hat Satellite Capsule 6.1 for RHEL 6 x86_64
Fixes
- BZ - 1213000 - Upgrade from 6.0.8 fails due to duplicate parameters
- BZ - 1253432 - Some upgrades are failing on RHEL 6 with an error about tomcat
- BZ - 1254252 - Fields 'Customer Portal Username/Password' under Access Insights > Manage(Sat 6.1.1) should not be mandatory to use Insights service
CVEs
(none)
Red Hat Satellite 6.1 for RHEL 7
| SRPM | |
|---|---|
| foreman-1.7.2.34-1.el7sat.src.rpm | SHA-256: 6e69369e13adecfa50b977801e1188853a0699aea696bc3151964030f9e95d92 |
| katello-2.2.0.15-1.el7sat.src.rpm | SHA-256: 3230184d5b8985fe24b06753a3347610cae2ab6af8cd8030e76bf4759f42dab7 |
| ruby193-rubygem-foreman-redhat_access-0.2.3-1.el7sat.src.rpm | SHA-256: 33d0e162461d0464939c3194ecdc4021596ba6b1ad36057d1d267968294be2f5 |
| x86_64 | |
| foreman-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: 264f6b6656d3d8f92c46970d55b82b9fa7e08f05bcfc2a6764528294bab70c62 |
| foreman-compute-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: ecf3447f773ff334cac2254d0f3f5d976a26fbc9b7a5172ca1d35f0699d23cb5 |
| foreman-debug-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: 7ce88b9ac0328213cdad04916d5941f729308cd5468f42144f3bb3c57b3168fa |
| foreman-gce-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: 3f1991015837846bc22de16a3333fc7d29870842f442c5478cffb7e85b61ed8d |
| foreman-libvirt-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: c0c8bf327b87947e04adc10e4bc2d26a8b76f7d39cdc87cd6e0daf97a2582b03 |
| foreman-ovirt-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: 48bcddbb723392037906f166e756c5519d1315fb74611702f00f49c7ec457603 |
| foreman-postgresql-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: b9e1d4724cef09cd0c99e5b2ec6d1e2310fb6567604c2f7e63b32c01be3d4741 |
| foreman-vmware-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: 5d847d19c1019388c19f7848314135f35b407d22e05872570333a1724dc87106 |
| katello-2.2.0.15-1.el7sat.noarch.rpm | SHA-256: 282a1a71d45f3cb9c9572f4fad1807626b28c74a3245a588d49ccfee89623ca7 |
| katello-common-2.2.0.15-1.el7sat.noarch.rpm | SHA-256: bb50824b7aaf9756a29819a9e5744d38e48352546beebb47a3a81636fd969656 |
| katello-debug-2.2.0.15-1.el7sat.noarch.rpm | SHA-256: 37b8e43fda1fb1ad0598ab9228e182df06ab736b6a9d70560bd70063626c8fe7 |
| katello-service-2.2.0.15-1.el7sat.noarch.rpm | SHA-256: b7d55c1cb2029ab9b0b45a61526cf4ce2deac471d451f2695a24045cdc31fb2b |
| ruby193-rubygem-foreman-redhat_access-0.2.3-1.el7sat.noarch.rpm | SHA-256: fe32b34552f9a8958abbde62fa77c81b31203fd49a1aab11de4953b07ee348d6 |
Red Hat Satellite 6.1 for RHEL 6
| SRPM | |
|---|---|
| foreman-1.7.2.34-1.el6_6sat.src.rpm | SHA-256: 6e68034231bc7cc1e75fe9086ffdd57963e1b93cddb5aa4989f90f09cc41cbbd |
| katello-2.2.0.15-1.el6_6sat.src.rpm | SHA-256: ff7ade522ac99be1b0cf843969d3a1464628eb7b0927e05c9bad61d72202b143 |
| ruby193-rubygem-foreman-redhat_access-0.2.3-1.el6_6sat.src.rpm | SHA-256: 65f427d1dc13d6ac0b74e89c4c26b58924f607e45d1b2c33d76947f8840e8e75 |
| x86_64 | |
| foreman-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: fefe7ce782a0a192aac22df79f22558b8b0e180b8222d442816956fc1884c6af |
| foreman-compute-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: 3259ead6beaa82ac009d6a8a0bc6915d1144d37a2cb6c1736f47dbeee4e980c7 |
| foreman-debug-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: 25edf731d6c6f6c14eb1d76206a511232557088107d94989e2bd22db9ba0f291 |
| foreman-gce-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: 34e66719165ceb791a0b7fc14ec1f14471d622bd4e16a49775bbc4adb4f98e96 |
| foreman-libvirt-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: 9219fd3d9fb7034bbbb75d3e95db402e965623daf2593b3d09ee0571ae58a138 |
| foreman-ovirt-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: 410d41cd16e8bef164e267ce5e28f414eae5ab61ff401df9881ef5a5a8f66d9f |
| foreman-postgresql-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: eb30b64e95bf4bb8bdc4b50fd37ae23b0f01f6bcbf58e231b93eb52e353a5f00 |
| foreman-vmware-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: 70b774f3ed9d0d98af46ce6cec5bada711f64adc315ad12130aefabb60dc8a56 |
| katello-2.2.0.15-1.el6_6sat.noarch.rpm | SHA-256: a7b9e0a5b367f7df7f7032f14fc6bdc649fd7b6be552f89bef368f774030c9af |
| katello-common-2.2.0.15-1.el6_6sat.noarch.rpm | SHA-256: 83603fcb8049688210ccf68bb50f6990af69677c26f9811ef06343dfdde98eef |
| katello-debug-2.2.0.15-1.el6_6sat.noarch.rpm | SHA-256: 794f8f2fde97df6228a681e6ebce68c6b12b0a29b0eaa9fb788c0a4a0f3c5853 |
| katello-service-2.2.0.15-1.el6_6sat.noarch.rpm | SHA-256: 73e6548f691c35395f8a08b87347c8cd8a065358d29de4df11c67040fa873680 |
| ruby193-rubygem-foreman-redhat_access-0.2.3-1.el6_6sat.noarch.rpm | SHA-256: 545e9f98e399797f85c1aee4b76f0b699098b7c421a67b9582dcf11e8efab6dd |
Red Hat Satellite Capsule 6.1 for RHEL 7
| SRPM | |
|---|---|
| foreman-1.7.2.34-1.el7sat.src.rpm | SHA-256: 6e69369e13adecfa50b977801e1188853a0699aea696bc3151964030f9e95d92 |
| katello-2.2.0.15-1.el7sat.src.rpm | SHA-256: 3230184d5b8985fe24b06753a3347610cae2ab6af8cd8030e76bf4759f42dab7 |
| x86_64 | |
| foreman-debug-1.7.2.34-1.el7sat.noarch.rpm | SHA-256: 7ce88b9ac0328213cdad04916d5941f729308cd5468f42144f3bb3c57b3168fa |
| katello-debug-2.2.0.15-1.el7sat.noarch.rpm | SHA-256: 37b8e43fda1fb1ad0598ab9228e182df06ab736b6a9d70560bd70063626c8fe7 |
| katello-service-2.2.0.15-1.el7sat.noarch.rpm | SHA-256: b7d55c1cb2029ab9b0b45a61526cf4ce2deac471d451f2695a24045cdc31fb2b |
Red Hat Satellite Capsule 6.1 for RHEL 6
| SRPM | |
|---|---|
| foreman-1.7.2.34-1.el6_6sat.src.rpm | SHA-256: 6e68034231bc7cc1e75fe9086ffdd57963e1b93cddb5aa4989f90f09cc41cbbd |
| katello-2.2.0.15-1.el6_6sat.src.rpm | SHA-256: ff7ade522ac99be1b0cf843969d3a1464628eb7b0927e05c9bad61d72202b143 |
| x86_64 | |
| foreman-debug-1.7.2.34-1.el6_6sat.noarch.rpm | SHA-256: 25edf731d6c6f6c14eb1d76206a511232557088107d94989e2bd22db9ba0f291 |
| katello-debug-2.2.0.15-1.el6_6sat.noarch.rpm | SHA-256: 794f8f2fde97df6228a681e6ebce68c6b12b0a29b0eaa9fb788c0a4a0f3c5853 |
| katello-service-2.2.0.15-1.el6_6sat.noarch.rpm | SHA-256: 73e6548f691c35395f8a08b87347c8cd8a065358d29de4df11c67040fa873680 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.