Bug 860802
Summary: | pulp doesnt handle errata spanning across multiple repos case | ||
---|---|---|---|
Product: | [Retired] Pulp | Reporter: | Preethi Thomas <pthomas> |
Component: | rpm-support | Assignee: | Todd Sanders <tsanders> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Preethi Thomas <pthomas> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | Master | CC: | dgregor, skarmark, tsanders |
Target Milestone: | --- | Keywords: | Triaged |
Target Release: | Sprint 40 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | 860800 | Environment: | |
Last Closed: | 2013-04-08 15:59:23 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 860800, 864999 | ||
Bug Blocks: |
Description
Preethi Thomas
2012-09-26 18:29:57 UTC
commit 3b4ad1856c96ebe6c325e8d0d86977009c4fbb8b build: 2.1.0-0.3.alpha [root@cloud-qe-8 ~]# rpm -q pulp-server pulp-server-2.1.0-0.26.beta.noarch [root@cloud-qe-8 ~]# [root@cloud-qe-8 ~]# pulp-admin rpm repo content errata --erratum-id RHBA-2012:1305 --repo-id rhel6-w +----------------------------------------------------------------------+ Erratum: RHBA-2012:1305 +----------------------------------------------------------------------+ Id: RHBA-2012:1305 Title: openswan bug fix update Summary: Updated openswan packages that fix a bug are now available for Red Hat Enterprise Linux 6. Description: Openswan is a free implementation of IPsec (Internet Protocol Security) and IKE(Internet Key Exchange) for Linux. The openswan packages contain daemons anduser-space tools for setting up Openswan. It supports the NETKEY/XFRM IPseckernel stack that exists in the default Linux kernel. Openswan 2.6 and lateralso supports IKEv2 (Internet Key Exchange Protocol version 2), which is definedin RFC5996. This update fixes the following bug: * When a tunnel was established between two IPsec hosts (say host1 and host2)utilizing DPD (Dead Peer Detection), and if host2 went offline while host1continued to transmit data, host1 continually queued multiple phase 2 requestsafter the DPD action. When host2 came back online, the stack of pending phase 2requests was established, leaving a new IPsec SA (Security Association), and alarge group of extra SA's that consumed system resources and eventually expired.This update ensures that openswan has just a single pending phase 2 requestduring the time that host2 is down, and when host2 comes back up, only a singlenew IPsec SA is established, thus preventing this bug. (BZ#852454) All users of openswan are advised to upgrade to these updated packages, whichfix this bug. Severity: Type: bugfix Issued: 2012-09-24 00:00:00 Updated: 2012-09-24 00:00:00 Version: 1 Release: Status: final Reboot Suggested: No Updated Packages: openswan-0:2.6.32-19.el6_3.i686 References: ID: None Type: self Link: https://rhn.redhat.com/errata/RHBA-2012-1305.html [root@cloud-qe-8 ~]# pulp-admin rpm repo content errata --erratum-id RHBA-2012:1305 --repo-id rhel6-w-optional +----------------------------------------------------------------------+ Erratum: RHBA-2012:1305 +----------------------------------------------------------------------+ Id: RHBA-2012:1305 Title: openswan bug fix update Summary: Updated openswan packages that fix a bug are now available for Red Hat Enterprise Linux 6. Description: Openswan is a free implementation of IPsec (Internet Protocol Security) and IKE(Internet Key Exchange) for Linux. The openswan packages contain daemons anduser-space tools for setting up Openswan. It supports the NETKEY/XFRM IPseckernel stack that exists in the default Linux kernel. Openswan 2.6 and lateralso supports IKEv2 (Internet Key Exchange Protocol version 2), which is definedin RFC5996. This update fixes the following bug: * When a tunnel was established between two IPsec hosts (say host1 and host2)utilizing DPD (Dead Peer Detection), and if host2 went offline while host1continued to transmit data, host1 continually queued multiple phase 2 requestsafter the DPD action. When host2 came back online, the stack of pending phase 2requests was established, leaving a new IPsec SA (Security Association), and alarge group of extra SA's that consumed system resources and eventually expired.This update ensures that openswan has just a single pending phase 2 requestduring the time that host2 is down, and when host2 comes back up, only a singlenew IPsec SA is established, thus preventing this bug. (BZ#852454) All users of openswan are advised to upgrade to these updated packages, whichfix this bug. Severity: Type: bugfix Issued: 2012-09-24 00:00:00 Updated: 2012-09-24 00:00:00 Version: 1 Release: Status: final Reboot Suggested: No Updated Packages: openswan-0:2.6.32-19.el6_3.i686 References: ID: None Type: self Link: https://rhn.redhat.com/errata/RHBA-2012-1305.html [root@cloud-qe-8 ~]# Pulp 2.1 released http://www.pulpproject.org/2013/04/05/pulp-2-1-0-released/ |