- Issued:
- 2014-10-13
- Updated:
- 2014-10-13
RHBA-2014:1424 - sapconf bug fix update
Synopsis
sapconf bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated sapconf package that fixes several bugs is now available for Red Hat Enterprise Linux 6.
Description
The sapconf package contains a script that checks the basic installation of Red Hat Enterprise Linux and modifies it according to SAP requirements. The script ensures that all necessary packages are installed and that configuration parameters are set correctly to run SAP software.
This update fixes the following bugs:
-
In certain situations, the sapconf script created the /etc/hosts file in an incorrect format, thus the file did not return the fully qualified domain name (FQDN). As a consequence, SAP installation failed unexpectedly. With this update, the script has been edited to handle situations when the incorrect /etc/hosts file was created. In addition, when FQDN is not returned properly, the script exits with the error code 4. (BZ#1024356)
-
Previously, the manual page for the sapconf script was missing. This update adds the missing manual page to the sapconf package. (BZ#1025187)
-
Due to a bug in the underlying source code, the sapconf script was unable to verify if a virtual guest was a VMware guest. Consequently, an attempt to use sapconf on such a guest failed. With this update, sapconf recognizes the VMware guests as expected. (BZ#1040617)
-
The order of reading limit files in Red Hat Enterprise Linux is as follows: First is read the /etc/security/limits.conf file and then the limit files located in the /etc/security/limits.d/ directory according to the C localization functions. When an entry is specified in two or more files, the entry that is read last takes effect. Previously, the sapconf script wrote entries to /etc/security/limits.conf, which could cause the sapconf entries to be overwritten by the same entries in files located in /etc/security/limits.d/. With this update, a separate sapconf limit file has been added to /etc/security/limits.d/ to anticipate this bug. (BZ#1051017)
-
When the sapconf script updated the /etc/hosts file, permissions of that file were incorrectly modified. This update applies a patch to fix this bug, and sapconf no longer overwrites the file's permissions. (BZ#1083651)
Users of sapconf are advised to upgrade to this updated package, which fixes these bugs.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for SAP Applications for x86_64 | 6 | x86_64 |
| Red Hat Enterprise Linux for SAP Applications for x86_64 - Extended Update Support | 6.7 | x86_64 |
| Red Hat Enterprise Linux for SAP Applications for x86_64 - Extended Life Cycle Support | 6 | x86_64 |
| Red Hat Enterprise Linux for SAP Applications for x86_64 - Extended Life Cycle Support Extension | 6 | x86_64 |
Updated Packages
- sapconf-0.98-2.el6.src.rpm
- sapconf-0.98-2.el6.noarch.rpm
Fixes
(none)
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.