This is the upgrade component to the Red Hat Satellite 5.7.0 GeneralAvailability release.

Red Hat Satellite provides a solution to organizations requiring absolutecontrol over and privacy of the maintenance and package deployment of theirservers. It allows organizations to utilize the benefits of Red Hat Network(RHN) without having to provide public Internet access to their servers or other client systems. Red Hat Satellite 5.7.0 may be upgraded from earlier releases.The upgrade documentation for Red Hat Satellite 5.7.0 specifically covers:* Upgrading the Red Hat Satellite to version 5.7 and upgrading the underlyingoperating system.* Upgrading the Red Hat Satellite to version 5.7 without upgrading theunderlying operating system.Users of Red Hat Satellite are advised to upgrade to this newly releasedversion.
Before applying this update, make sure that all previously-released erratarelevant to your system have been applied.This update is available via Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Network Satellite (v. 5.2 for RHEL 5)

SRPMS:
rhn-upgrade-5.7.0.22-1.el5sat.src.rpm
    MD5: ce6983438da1e10d88d0d633dc1bab6eSHA-256: ccb61c414d0dae49598d06a47b48b4401eaba08daef0be2a35fdf92601fb88d4
 
IA-32:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
s390x:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
x86_64:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
Red Hat Network Satellite (v. 5.3 for RHEL 5)

SRPMS:
rhn-upgrade-5.7.0.22-1.el5sat.src.rpm
    MD5: ce6983438da1e10d88d0d633dc1bab6eSHA-256: ccb61c414d0dae49598d06a47b48b4401eaba08daef0be2a35fdf92601fb88d4
 
IA-32:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
s390x:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
x86_64:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
Red Hat Network Satellite (v. 5.4 for RHEL 5)

SRPMS:
rhn-upgrade-5.7.0.22-1.el5sat.src.rpm
    MD5: ce6983438da1e10d88d0d633dc1bab6eSHA-256: ccb61c414d0dae49598d06a47b48b4401eaba08daef0be2a35fdf92601fb88d4
 
IA-32:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
s390x:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
x86_64:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
Red Hat Network Satellite (v. 5.4 for RHEL 6)

SRPMS:
rhn-upgrade-5.7.0.22-1.el6sat.src.rpm
    MD5: b1613b9f102db387151b08337f2cc0c2SHA-256: 467e824069e12c00a3488223538c04737e55feb349cba5e0c57e2dff3ffe85d0
 
s390x:
rhn-upgrade-5.7.0.22-1.el6sat.noarch.rpm
    MD5: a15f745e03bf75e3c1ef310faae1753fSHA-256: 3008d95cf78ba5c8484c79788be3091cf75371afcb7dfe73f18549c51f7fc42b
 
x86_64:
rhn-upgrade-5.7.0.22-1.el6sat.noarch.rpm
    MD5: a15f745e03bf75e3c1ef310faae1753fSHA-256: 3008d95cf78ba5c8484c79788be3091cf75371afcb7dfe73f18549c51f7fc42b
 
Red Hat Network Satellite (v. 5.5 for RHEL 5)

SRPMS:
rhn-upgrade-5.7.0.22-1.el5sat.src.rpm
    MD5: ce6983438da1e10d88d0d633dc1bab6eSHA-256: ccb61c414d0dae49598d06a47b48b4401eaba08daef0be2a35fdf92601fb88d4
 
s390x:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
x86_64:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
Red Hat Network Satellite (v. 5.5 for RHEL 6)

SRPMS:
rhn-upgrade-5.7.0.22-1.el6sat.src.rpm
    MD5: b1613b9f102db387151b08337f2cc0c2SHA-256: 467e824069e12c00a3488223538c04737e55feb349cba5e0c57e2dff3ffe85d0
 
s390x:
rhn-upgrade-5.7.0.22-1.el6sat.noarch.rpm
    MD5: a15f745e03bf75e3c1ef310faae1753fSHA-256: 3008d95cf78ba5c8484c79788be3091cf75371afcb7dfe73f18549c51f7fc42b
 
x86_64:
rhn-upgrade-5.7.0.22-1.el6sat.noarch.rpm
    MD5: a15f745e03bf75e3c1ef310faae1753fSHA-256: 3008d95cf78ba5c8484c79788be3091cf75371afcb7dfe73f18549c51f7fc42b
 
Red Hat Satellite (v. 5.6 for RHEL 5)

SRPMS:
rhn-upgrade-5.7.0.22-1.el5sat.src.rpm
    MD5: ce6983438da1e10d88d0d633dc1bab6eSHA-256: ccb61c414d0dae49598d06a47b48b4401eaba08daef0be2a35fdf92601fb88d4
 
s390x:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
x86_64:
rhn-upgrade-5.7.0.22-1.el5sat.noarch.rpm
    MD5: eb5cb0ff8005055b5cd8436651efcc55SHA-256: 0abb29830f64183b577fd41d8fbb121d319739ee98f183519ef9466707da7e0d
 
Red Hat Satellite (v. 5.6 for RHEL 6)

SRPMS:
rhn-upgrade-5.7.0.22-1.el6sat.src.rpm
    MD5: b1613b9f102db387151b08337f2cc0c2SHA-256: 467e824069e12c00a3488223538c04737e55feb349cba5e0c57e2dff3ffe85d0
 
s390x:
rhn-upgrade-5.7.0.22-1.el6sat.noarch.rpm
    MD5: a15f745e03bf75e3c1ef310faae1753fSHA-256: 3008d95cf78ba5c8484c79788be3091cf75371afcb7dfe73f18549c51f7fc42b
 
x86_64:
rhn-upgrade-5.7.0.22-1.el6sat.noarch.rpm
    MD5: a15f745e03bf75e3c1ef310faae1753fSHA-256: 3008d95cf78ba5c8484c79788be3091cf75371afcb7dfe73f18549c51f7fc42b
 
(The unlinked packages above are only available from the Red Hat Network)
1128174 – Satellite 5.7.0 Upgrades Tracking Bug

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply