- Issued:
- 2020-02-13
- Updated:
- 2020-02-13
RHBA-2020:0496 - Bug Fix Advisory
Synopsis
Satellite 6.6.2 Async Bug Fix Update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Satellite 6.6 packages that fix several bugs are now available for Red Hat Satellite.
Description
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
This update fixes the following bugs:
- A virt-who hypervisor update was blocking the RHSM certs check for several minutes, which caused `503` errors and connection timeouts. (BZ#1791492)
- Content synchronization was failing with the following error: PG::ProtocolViolation: ERROR: invalid message format. (BZ#1791493)
- To improve performance and prevent problems with hanging tasks, the `Actions::Katello::Host::Update` action is no longer handled by dynflow. (BZ#1791494)
- There was a problem preventing Foreman rake batch cleanups that resulted in the following error: ERROR: invalid message format. (BZ#1791495)
- The comps.xml file was missing environment groups information from the repositories inside a Content View. (BZ#1791496)
- Attempting to clean orphaned facts was failing with the following error: NoMethodError: undefined method `map' for nil:NilClass. (BZ#1791498)
- The Puppet module `puppet-access_insights_client` was generating excessive load in large Satellite deployments. (BZ#1791499)
- Escape backslashes were being added to the value each time an Ansible array variable was edited. (BZ#1791500)
- The satellite-change-hostname command was failing with the error: "illegal option -- r". (BZ#1791501)
- Red Hat Satellite Tools 6.5 repository for RHEL 8 was not appearing as selected in the Satellite web UI. (BZ#1791502)
- Upgrade katello-ca-consumer RPM was causing the rhsm.conf file to point back to the Customer Portal. (BZ#1791503)
- The virt-who hypervisor update jobs were failing with a duplicate entry for the cp_consumer_hypervisor_ukey key. (BZ#1791504)
- Client registration performance times on Satellite 6.5 were slow. (BZ#1791505)
- The RHSM facts for a host remained after removing registration for that host. This caused reregistering the host to fail. (BZ#1791506)
- An error prevented the registration of hosts with a bonded primary interface. (BZ#1791879)
- While updating stacked entitlements, the Candlepin service was hanging on ExpiredPoolsJob step indefinitely. (BZ#1794583)
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For detailed instructions how to apply this update, refer to:
Affected Products
- Red Hat Satellite 6.6 x86_64
- Red Hat Satellite Capsule 6.6 x86_64
Fixes
- BZ - 1791492 - virt-who hypervisor update may cause rhsm certs check to stuck for several minutes which will lead to 503 or connection timeout
- BZ - 1791493 - Unable to sync the contents due to an error - PG::ProtocolViolation: ERROR: invalid message format
- BZ - 1791494 - Move Actions::Katello::Host::Update out of dynflow
- BZ - 1791495 - Foreman-rake facts:cleanup batch/rolling support
- BZ - 1791496 - comps.xml is missing environment groups information from the repositories inside content view in Satellite 6.6
- BZ - 1791498 - Cleaning orphaned facts fails with undefined method map
- BZ - 1791499 - puppet-access_insights_client causes excessive load on Satellite
- BZ - 1791500 - Escape backslashes added to value each time Ansible array variable is edited in Satellite 6.6 beta
- BZ - 1791501 - satellite-change-hostname fails with error "illegal option -- r".
- BZ - 1791502 - Red Hat Satellite Tools 6.5 repository for RHEL 8 showing not selected on Red Hat Satellite
- BZ - 1791503 - Upgrade katello-ca-consumer rpm will cause rhsm.conf to point back to customer portal.
- BZ - 1791504 - virt-who hypervisor update jobs are failing with a duplicate entry for key cp_consumer_hypervisor_ukey
- BZ - 1791505 - Client registration on Satellite 6.5 is really slow compared to 6.4
- BZ - 1791506 - Remove RHSM facts when unregistering
- BZ - 1791879 - Unable to register a machine with bonded primary interface
- BZ - 1794583 - candlepin hangs on ExpiredPoolsJob forever while Updating stacked entitlements
CVEs
References
(none)
Red Hat Satellite 6.6
SRPM | |
---|---|
candlepin-2.6.13-1.el7sat.src.rpm | SHA-256: e3c9ace5501954bd61e1cea4faaf2ea159164c741274d8d3d323f157a78e3cfb |
foreman-1.22.0.36-1.el7sat.src.rpm | SHA-256: 857c166185d007a1070313f29a0d9ce0f4f2e3cb8993b0653ff917f753a02c25 |
foreman-installer-1.22.0.17-1.el7sat.src.rpm | SHA-256: 777288818bef31bd1f2df7aeab89e36c41d272fbf49e5e7e9ef21ca8a6417957 |
katello-3.12.0-3.el7sat.src.rpm | SHA-256: 3197a15d5380e83547df89e78ae675a1ab4a04ee1b69287bb6808211307ffe57 |
redhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm | SHA-256: bdf90680dd5bf4be5ae946d638aa6caad7d28036e236d965f607275381b2b33b |
satellite-6.6.2-1.el7sat.src.rpm | SHA-256: b3374a29ad9aca63405971f4d7f49ed83fb178b2f438a82466e34ac803fde31f |
tfm-rubygem-foreman_ansible-3.0.7.2-2.el7sat.src.rpm | SHA-256: 2b640aad19d59aecdf361860e58d35ac584208e9b4b7ce36515f4182bbc36c0f |
tfm-rubygem-katello-3.12.0.37-1.el7sat.src.rpm | SHA-256: af2f70bf42dbe3de3cd1725b437ea54a99f07e80ce2a76b7d43f4b68c97ebb5b |
tfm-rubygem-runcible-2.12.1-1.el7sat.src.rpm | SHA-256: 22a58b16f7cd27441d4e33b93c0f499634021f3c065b2c7020e73ac4cc055b6e |
x86_64 | |
candlepin-2.6.13-1.el7sat.noarch.rpm | SHA-256: 4db737f08c6706d9c92b006d96fe075a019b4556aba8ef6da07b97374b94c2b5 |
candlepin-selinux-2.6.13-1.el7sat.noarch.rpm | SHA-256: b8304f5f66614c4431f379fe783a78f9b57462d9cd2afbb7e680d93cf726e932 |
foreman-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: f86c6671ce600af71e4d7e5e32bc7b96ce3953c927fc3917d05b5147705ede32 |
foreman-cli-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 16d02a4d37537512d8701dbc471c8570c816eb709e8bcfbe38b5db00ea5a1264 |
foreman-debug-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 51b2163f4ec66dc76ee0ffbc2bb9efa3302b896e0e4a727cbe313a2a1b1da76f |
foreman-ec2-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 4affb116edf392bf8ac59a8cf27c2fa703aac6e7e24eea8273cbf0dfbae248b7 |
foreman-gce-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: bed16dae67e3aab7a5b3f80ad67fd986113f06e99e3490a214eda61b71a8e7d9 |
foreman-installer-1.22.0.17-1.el7sat.noarch.rpm | SHA-256: 0c577409c7d5d1d57daf5b4e319dc40b2f1db112e0df47f702874064dc8afb70 |
foreman-installer-katello-1.22.0.17-1.el7sat.noarch.rpm | SHA-256: 71f046733eb5439cb3345d0c37b829a95e406ebca8f6dccc01ff8ddf2e37f736 |
foreman-journald-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 6742d2e0783cbf69bc9ace821efa68cbf7c5dc85538ce1b6779734a877be41a9 |
foreman-libvirt-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 605485f9404d0ec34f4f1aafa1a3cfa7300ec58d808996648a476e3ea12150f9 |
foreman-openstack-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 6369eade675b8f0f848395b77c217d895a901ecabad6d7b0c93d579db8e801af |
foreman-ovirt-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 8e2faa27e57014ac94100f69dc421c976cd1f6baab9a00f0c7a2d04048365e09 |
foreman-postgresql-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 8cb19812478a77f533a9c1b8703731b8dc469b83c5183c052725f11939e047eb |
foreman-proxy-content-3.12.0-3.el7sat.noarch.rpm | SHA-256: a5f303829dd75839467994374c58fa66c921efe9e61149215e8fd0f288a0c842 |
foreman-rackspace-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: a1dba25ee108d59271868ed432feb5b9ef87157c7d89f17a03490ec51ea95910 |
foreman-telemetry-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 599fdc10403ca413887cc497782fe0efe9a8f015e0bb832e7ec909c664cf5880 |
foreman-vmware-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 602f4f83d121ca2d003f4ee56bfe45a6048e7ae5a1f188dc1fb2dc738a175fa6 |
katello-3.12.0-3.el7sat.noarch.rpm | SHA-256: 550e747f569ad455bcad58df587acfe63b48ed8e008f0ecb29d0f7c014257c47 |
katello-common-3.12.0-3.el7sat.noarch.rpm | SHA-256: d70955316474504202fb09576199f228acfdc787619bc55031917d791de83429 |
katello-debug-3.12.0-3.el7sat.noarch.rpm | SHA-256: c41785229a978201db3f4bd9937aa8aa67d6215463377a800704a84d1c287b54 |
katello-service-3.12.0-3.el7sat.noarch.rpm | SHA-256: 1a4294a17947b58b63652c95fc120c6264d1a788a7092f3f61997a126296ae5f |
redhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm | SHA-256: 5a6cd5107290fc6cafc2f763198cb05d8205a8992f9ac4c0e5376806592abf47 |
satellite-6.6.2-1.el7sat.noarch.rpm | SHA-256: 271f373ea07f60b7b67dbe677479d9d938079e805411a60787e02a111e9351cc |
satellite-capsule-6.6.2-1.el7sat.noarch.rpm | SHA-256: 12f5b02e08033732bb0088cc8f02854078c2279aa5292c1bf47bb31bf505ee32 |
satellite-cli-6.6.2-1.el7sat.noarch.rpm | SHA-256: 9e44bed1612766580d7c981a58f1a04f4a8ba91dc6b0d88340045bbe5b30e97c |
satellite-common-6.6.2-1.el7sat.noarch.rpm | SHA-256: c2e953fb0655e0881a1caffe6258e254dee43fd83d697a3e6cbf644206e3d060 |
satellite-debug-tools-6.6.2-1.el7sat.noarch.rpm | SHA-256: 1fa14764b988c0e8a4fecd57f4c986d0e76ac32d56b6e94e9c86e3c7c885b2bf |
tfm-rubygem-foreman_ansible-3.0.7.2-2.el7sat.noarch.rpm | SHA-256: aff1ce0223c72aeab48d82716f26c9c9ed34397a5bad7506bcc08301f601acbd |
tfm-rubygem-katello-3.12.0.37-1.el7sat.noarch.rpm | SHA-256: adbf1ed3e668c0b072d7d95a0a9cd6f41914317962b0477c309eb687b40f1b3d |
tfm-rubygem-runcible-2.12.1-1.el7sat.noarch.rpm | SHA-256: 422012a6ab74ead8d902bf4e0784def7aa9987de03221e5089056638f5dda6a1 |
Red Hat Satellite Capsule 6.6
SRPM | |
---|---|
foreman-1.22.0.36-1.el7sat.src.rpm | SHA-256: 857c166185d007a1070313f29a0d9ce0f4f2e3cb8993b0653ff917f753a02c25 |
foreman-installer-1.22.0.17-1.el7sat.src.rpm | SHA-256: 777288818bef31bd1f2df7aeab89e36c41d272fbf49e5e7e9ef21ca8a6417957 |
katello-3.12.0-3.el7sat.src.rpm | SHA-256: 3197a15d5380e83547df89e78ae675a1ab4a04ee1b69287bb6808211307ffe57 |
redhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm | SHA-256: bdf90680dd5bf4be5ae946d638aa6caad7d28036e236d965f607275381b2b33b |
satellite-6.6.2-1.el7sat.src.rpm | SHA-256: b3374a29ad9aca63405971f4d7f49ed83fb178b2f438a82466e34ac803fde31f |
x86_64 | |
foreman-debug-1.22.0.36-1.el7sat.noarch.rpm | SHA-256: 51b2163f4ec66dc76ee0ffbc2bb9efa3302b896e0e4a727cbe313a2a1b1da76f |
foreman-installer-1.22.0.17-1.el7sat.noarch.rpm | SHA-256: 0c577409c7d5d1d57daf5b4e319dc40b2f1db112e0df47f702874064dc8afb70 |
foreman-installer-katello-1.22.0.17-1.el7sat.noarch.rpm | SHA-256: 71f046733eb5439cb3345d0c37b829a95e406ebca8f6dccc01ff8ddf2e37f736 |
foreman-proxy-content-3.12.0-3.el7sat.noarch.rpm | SHA-256: a5f303829dd75839467994374c58fa66c921efe9e61149215e8fd0f288a0c842 |
katello-common-3.12.0-3.el7sat.noarch.rpm | SHA-256: d70955316474504202fb09576199f228acfdc787619bc55031917d791de83429 |
katello-debug-3.12.0-3.el7sat.noarch.rpm | SHA-256: c41785229a978201db3f4bd9937aa8aa67d6215463377a800704a84d1c287b54 |
katello-service-3.12.0-3.el7sat.noarch.rpm | SHA-256: 1a4294a17947b58b63652c95fc120c6264d1a788a7092f3f61997a126296ae5f |
redhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm | SHA-256: 5a6cd5107290fc6cafc2f763198cb05d8205a8992f9ac4c0e5376806592abf47 |
satellite-capsule-6.6.2-1.el7sat.noarch.rpm | SHA-256: 12f5b02e08033732bb0088cc8f02854078c2279aa5292c1bf47bb31bf505ee32 |
satellite-common-6.6.2-1.el7sat.noarch.rpm | SHA-256: c2e953fb0655e0881a1caffe6258e254dee43fd83d697a3e6cbf644206e3d060 |
satellite-debug-tools-6.6.2-1.el7sat.noarch.rpm | SHA-256: 1fa14764b988c0e8a4fecd57f4c986d0e76ac32d56b6e94e9c86e3c7c885b2bf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.