Bug 875630

Summary: turn off installonly limit on debug-restore
Product: Red Hat Enterprise Linux 6 Reporter: Karel Srot <ksrot>
Component: yum-utilsAssignee: Valentina Mukhamedzhanova <vmukhame>
Status: CLOSED WONTFIX QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.3CC: ovasik, tcallawa
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-07-25 14:59:02 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Karel Srot 2012-11-12 09:04:20 UTC
Description of problem:

turn off installonly on debug-restore. This is to track the changes required on yum-utils side.

For details see bug 820674, especially #c10 and #c11.


Version-Release number of selected component (if applicable):
yum-utils-1.1.30-14.el6

How reproducible:
always


Steps to Reproduce:
see https://bugzilla.redhat.com/show_bug.cgi?id=820674#c0
  
Actual results:
some kernels are removed

Expected results:
all kernels installed after debug-restore

Comment 1 RHEL Program Management 2013-10-14 00:16:41 UTC
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unable to address this
request at this time.

Red Hat invites you to ask your support representative to
propose this request, if appropriate, in the next release of
Red Hat Enterprise Linux.

Comment 2 Valentina Mukhamedzhanova 2016-07-25 14:59:02 UTC
Red Hat Enterprise Linux version 6 is entering the Production 2 phase of its lifetime and this bug doesn't meet the criteria for it, i.e. only high severity issues will be fixed. Please see https://access.redhat.com/support/policy/updates/errata/ for further information.