RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1445091 - yum list-sec and yum update-minimal do not show or install all available security updates when RHEL 6 Optional repo is enabled
Summary: yum list-sec and yum update-minimal do not show or install all available secu...
Keywords:
Status: CLOSED DUPLICATE of bug 1408508
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: yum
Version: 6.8
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Valentina Mukhamedzhanova
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks: 1353215
TreeView+ depends on / blocked
 
Reported: 2017-04-24 22:21 UTC by Candace Sheremeta
Modified: 2020-12-14 08:33 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-08-16 15:46:47 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1408508 0 high CLOSED If Advisory exists in multiple repos yum only uses one of the package lists 2021-09-09 12:03:31 UTC

Internal Links: 1408508

Description Candace Sheremeta 2017-04-24 22:21:40 UTC
Description of problem:
yum list-sec and yum update-minimal do not show or install all available security updates when RHEL 6/7 Server Optional repo is enabled

Version-Release number of selected component (if applicable):
RHEL 6.8 and 7.3 (please let me know if I need to open another BZ for 7.3)

How reproducible:
100%

Steps to Reproduce:
1. install a RHEL6u8
2. enable repos:
rhel-6-server-optional-rpms     
rhel-6-server-rpms     
rhel-6-server-satellite-tools-6.2-rpms   
3. yum updateinfo info RHSA-2017:0184 OR yum update --advisory RHSA-2017:0184 --assumeno (this will fail)
4. disable optional repo
5. clean cache
6. yum updateinfo info RHSA-2017:0184 OR yum update --advisory RHSA-2017:0184 --assumeno (this will succeed)

Actual results:
# yum updateinfo info RHSA-2017:0184
Loaded plugins: package_upload, product-id, search-disabled-repos, security, subscription-manager
rhel-6-server-optional-rpms     
rhel-6-server-rpms     
rhel-6-server-satellite-tools-6.2-rpms
No update information found for "RHSA-2017:0184"

# yum update --advisory RHSA-2017:0184 --assumeno 
Loaded plugins: package_upload, product-id, search-disabled-repos, security, subscription-manager
Setting up Update Process
rhel-6-server-optional-rpms
rhel-6-server-rpms
rhel-6-server-satellite-tools-6.2-rpms
Resolving Dependencies
Limiting packages to security relevant ones
Advisory "RHSA-2017:0184" not found applicable for this system
No packages needed for security; 187 packages available

Expected results:
Would like this to work

Additional info:
N/A

Comment 2 Mike McCune 2017-06-01 19:32:08 UTC
A clear example of this behavior:

[root@ibm-x3650m4-01-vm-14 ~]# yum --disablerepo rhel-6-server-optional-rpms list-sec | wc -l
1839

[root@ibm-x3650m4-01-vm-14 ~]# yum list-sec | wc -l
603

if you disable the optional repo in the listing of security errata, it works fine, but with it enabled you miss a huge portion of the errata

Comment 3 Pavel Moravec 2017-06-02 08:14:06 UTC
I am quite convinced this is dup of bz1408508, cf. https://bugzilla.redhat.com/show_bug.cgi?id=1408508#c12 with:

# zgrep RHSA-2017:0725 /var/lib/pulp/published/yum/https/repos/Default_Organization/Library/content/dist/rhel/server/6/6Server/x86_64/optional/os/repodata/*
/var/lib/pulp/published/yum/https/repos/Default_Organization/Library/content/dist/rhel/server/6/6Server/x86_64/optional/os/repodata/8528f80d6ab8142b19f6c104d37d630d2a1bd20d-updateinfo.xml.gz:<update from="release-engineering" status="final" type="security" version="7"><id>RHSA-2017:0725</id><issued date="2017-03-21 06:17:48 UTC" /><title>Moderate: bash security and bug fix update</title><release>0</release><rights>Copyright 2017 Red Hat Inc</rights><solution>For details on how to apply this update, which includes the changes described in
/var/lib/pulp/published/yum/https/repos/Default_Organization/Library/content/dist/rhel/server/6/6Server/x86_64/optional/os/repodata/8528f80d6ab8142b19f6c104d37d630d2a1bd20d-updateinfo.xml.gz:from the References section.</description><updated date="2017-03-21 06:18:32 UTC" /><references><reference href="https://access.redhat.com/errata/RHSA-2017:0725" id="RHSA-2017:0725" title="RHSA-2017:0725" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377613" id="1377613" title="CVE-2016-0634 bash: Arbitrary code execution via malicious hostname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379630" id="1379630" title="CVE-2016-7543 bash: Specially crafted SHELLOPTS+PS4 variables allows command substitution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396383" id="1396383" title="CVE-2016-9401 bash: popd controlled free" type="bugzilla" /><reference href="https://www.redhat.com/security/data/cve/CVE-2016-0634.html" id="CVE-2016-0634" title="CVE-2016-0634" type="cve" /><reference href="https://www.redhat.com/security/data/cve/CVE-2016-7543.html" id="CVE-2016-7543" title="CVE-2016-7543" type="cve" /><reference href="https://www.redhat.com/security/data/cve/CVE-2016-9401.html" id="CVE-2016-9401" title="CVE-2016-9401" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="classification" title="moderate" type="other" /><reference href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html" id="ref_0" title="other_reference_0" type="other" /><reference href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html" id="ref_1" title="other_reference_1" type="other" /></references><pkglist><collection short=""><name>rhel-6-server-rpms__6Server__x86_64</name></collection></pkglist><pkglist><collection short=""><name>rhel-6-server-optional-rpms__6Server__x86_64</name><package arch="x86_64" epoch="0" name="bash-doc" release="48.el6" src="bash-4.1.2-48.el6.src.rpm" version="4.1.2"><filename>bash-doc-4.1.2-48.el6.x86_64.rpm</filename><sum type="sha256">e896067f6253cba4f5db912775873566c86b4fd550ddfa9a586beb1d6c2b7425</sum></package></collection></pkglist></update>
#

and:

# zgrep RHSA-2017:0725 /var/lib/pulp/published/yum/https/repos/Default_Organization/Library/content/dist/rhel/server/6/6Server/x86_64/os/repodata/*
/var/lib/pulp/published/yum/https/repos/Default_Organization/Library/content/dist/rhel/server/6/6Server/x86_64/os/repodata/43b8d2a2e5bc9c85231aa05fb1cbed6898593092-updateinfo.xml.gz:<update from="release-engineering" status="final" type="security" version="7"><id>RHSA-2017:0725</id><issued date="2017-03-21 06:17:48 UTC" /><title>Moderate: bash security and bug fix update</title><release>0</release><rights>Copyright 2017 Red Hat Inc</rights><solution>For details on how to apply this update, which includes the changes described in
/var/lib/pulp/published/yum/https/repos/Default_Organization/Library/content/dist/rhel/server/6/6Server/x86_64/os/repodata/43b8d2a2e5bc9c85231aa05fb1cbed6898593092-updateinfo.xml.gz:from the References section.</description><updated date="2017-03-21 06:18:32 UTC" /><references><reference href="https://access.redhat.com/errata/RHSA-2017:0725" id="RHSA-2017:0725" title="RHSA-2017:0725" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377613" id="1377613" title="CVE-2016-0634 bash: Arbitrary code execution via malicious hostname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379630" id="1379630" title="CVE-2016-7543 bash: Specially crafted SHELLOPTS+PS4 variables allows command substitution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396383" id="1396383" title="CVE-2016-9401 bash: popd controlled free" type="bugzilla" /><reference href="https://www.redhat.com/security/data/cve/CVE-2016-0634.html" id="CVE-2016-0634" title="CVE-2016-0634" type="cve" /><reference href="https://www.redhat.com/security/data/cve/CVE-2016-7543.html" id="CVE-2016-7543" title="CVE-2016-7543" type="cve" /><reference href="https://www.redhat.com/security/data/cve/CVE-2016-9401.html" id="CVE-2016-9401" title="CVE-2016-9401" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="classification" title="moderate" type="other" /><reference href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html" id="ref_0" title="other_reference_0" type="other" /><reference href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html" id="ref_1" title="other_reference_1" type="other" /></references><pkglist><collection short=""><name>rhel-6-server-rpms__6Server__x86_64</name><package arch="x86_64" epoch="0" name="bash" release="48.el6" src="bash-4.1.2-48.el6.src.rpm" version="4.1.2"><filename>bash-4.1.2-48.el6.x86_64.rpm</filename><sum type="sha256">ea357dfce36e9d904281fc57ada83f0cf3f0461de8a5b91c1fc787e73a94803c</sum></package></collection></pkglist><pkglist><collection short=""><name>rhel-6-server-optional-rpms__6Server__x86_64</name></collection></pkglist></update>
#


See the empty pkglist for rhel-6-server-optional-rpms collection in rhel-6-server-rpms repodata and vice versa.

Comment 4 Chris Williams 2017-08-16 15:46:47 UTC

*** This bug has been marked as a duplicate of bug 1408508 ***


Note You need to log in before you can comment on or make changes to this bug.