Bug 128035
Summary: | up2date falls over with pango.modules conflict | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Peter Chiu <p.c.m.chiu> |
Component: | up2date | Assignee: | Bret McMillan <bretm> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | CC: | otaylor, p.c.m.chiu |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-10-19 19:22:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 124236 |
Description
Peter Chiu
2004-07-16 16:04:56 UTC
Is there any update on this call please? It's a known issue that not all libraries parallel install between x86_64 and i386 in RHEL3. Work has been done to fix this in develment versions but the changes are quite substantial and thus potentially dangerous. It is not yet decided when to introduce those changes into a RHEL3 update. I'm going to reassing this bug to up2date since it isn't clear to me why up2date should be trying to pull in the i386 version of additional packages. There may be some debug options you can add to get more information about why it's pulling in the above packages. I am seeing this on fedora core 3 test 1. To reproduce, install it on an x86_64 machine fresh as a "workstation" install. Then run up2date from the gnome "tray". When it displays the list of packages, you'll see some i386 packages in there that duplicate the x86_64 ones that are also listed. This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |