Release Notes

Issue 1:
Description
When performing the system update task as a sudo user on a target that does not have OMSA installed,
the Scheduled F/W & Driver Inventory task fails with the "sudo requires password" error. [48587]
Resolution
Edit the sudoers file using the visudo command, and add the following:
For target systems running a 32-bit operating system:
Cmnd_Alias OMEUPDATE = /bin/tar,/opt/dell/srvadmin/bin/omexec
,/tmp/LinuxPreInstallPackage/runbada,/tmp/LinuxPreInstallPackage/omexec, /tmp/invcol.bin
<sudo_username> ALL=OMEUPDATE,NOPASSWD:OMEUPDATE
For target systems running a 64-bit operating system:
Cmnd_Alias OMEUPDATE = /bin/tar,/opt/dell/srvadmin/bin/omexec,
/tmp/LinuxPreInstallPackage64/runbada, /tmp/LinuxPreInstallPackage64/omexec,/tmp/invcol64.bin
<sudo_username> ALL=OMEUPDATE,NOPASSWD:OMEUPDATE
Issue 2:
Description
Simultaneously running the OMSA deployment task and in-band system update task on the same server
is not supported. [44598]
Issue 3:
Description
Dell Update Packages (DUPs) for supporting Red Hat Enterprise Linux 7 updates are not yet available in
the update catalog, and those system will appear as compliant in OpenManage Essentials. After the
packages are available OpenManage Essentials will be able to calculate compliance and update the
target systems.
Issue 4:
Description
In rare cases, inapplicable package may be listed in the compliance report, but the updates are not
applied to the target node if the package is not applicable.
Issue 5:
Description
Intel PCI-E driver package information for a server displayed in OpenManage Essentials might be
different than the driver package information displayed in SUU. Package name, Component name,
Current Version, and Repository Version might be different. [473495]
Issue 6:
Description
Broadcom NetXtreme driver package information for a server displayed in OpenManage Essentials might
be different than the driver package information displayed in SUU. Package name, Component name,
Current Version, and Repository Version might be different. [473493]
Issue 7:
Description
For systems with a Trusted Computing Group (TCG) 1.2-compliant Trusted Platform Module (TPM) chip,
software updates for the BIOS fail if the following are true:
The Microsoft Windows BitLocker Drive Encryption feature is enabled.
The TPM feature is set (using BIOS) to ON with Preboot Measurement.