|[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]|
--------------------------------------------------------------------- Red Hat, Inc. Red Hat Bug Fix Advisory Synopsis: New tmpwatch package fixes cron warning Advisory ID: RHBA-2001:104-09 Issue date: 2001-08-28 Updated on: 2002-02-04 Product: Red Hat Linux Keywords: tmpwatch cron man Cross references: RHSA-2001:072 Obsoletes: RHSA-2000:080 --------------------------------------------------------------------- 1. Topic: The man update (RHSA-2001:072) removed several cache directories in /var that tmpwatch cleans up on a nightly basis. This update provides a new cron script for tmpwatch that verifies the existence of cache directories before cleaning is attempted. 2. Relevant releases/architectures: Red Hat Linux 5.2 - alpha, i386, sparc Red Hat Linux 6.2 - alpha, i386, sparc Red Hat Linux 7.0 - alpha, i386 Red Hat Linux 7.1 - alpha, i386, ia64 Red Hat Linux 7.2 - i386, ia64 3. Problem description: tmpwatch is a program that runs nightly, and cleans up old temporary files that are older than a certain date. As shipped in Red Hat Linux 5.x, 6.x, and 7.x, tmpwatch cleans up cached man pages stored in directories under /var. A recent man security update (RHSA-2001:072) removed these directories. The symptom of this is that cron, the Linux periodic job scheduler, will report errors from the tmpwatch service on a nightly basis. The messages are similar to the following: /etc/cron.daily/tmpwatch: error: lstat() of directory /var/cache/man/X11R6/cat? failed: No such file or directory Note that these messages do not affect the tmpwatch service. The new tmpwatch will check for the existence of the manual page cache directories before attempting to clean them, stopping the messages from the cron service. In addition, the new tmpwatch adds some new functionality and fixes a few minor bugs present in previous releases. See the RPM changelog for details. 2001-11-28: an issue that only surfaces on systems upgraded to Red Hat Linux 7.2 where filesystems were converted from ext2 to ext3 format has been fixed. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 47784 - man problem after an update 56815 - /etc/fstab update failure 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp://updates.redhat.com/5.2/en/os/SRPMS/tmpwatch-2.8-0.5.x.src.rpm alpha: ftp://updates.redhat.com/5.2/en/os/alpha/tmpwatch-2.8-0.5.x.alpha.rpm i386: ftp://updates.redhat.com/5.2/en/os/i386/tmpwatch-2.8-0.5.x.i386.rpm sparc: ftp://updates.redhat.com/5.2/en/os/sparc/tmpwatch-2.8-0.5.x.sparc.rpm Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/tmpwatch-2.8-0.6.x.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/tmpwatch-2.8-0.6.x.alpha.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386/tmpwatch-2.8-0.6.x.i386.rpm sparc: ftp://updates.redhat.com/6.2/en/os/sparc/tmpwatch-2.8-0.6.x.sparc.rpm Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm alpha: ftp://updates.redhat.com/7.1/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm ia64: ftp://updates.redhat.com/7.1/en/os/ia64/tmpwatch-2.8-0.7.x.ia64.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/tmpwatch-2.8.1-1.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/tmpwatch-2.8.1-1.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/tmpwatch-2.8.1-1.ia64.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 0168c76dabc604362835ad1b6c2a80e9 5.2/en/os/SRPMS/tmpwatch-2.8-0.5.x.src.rpm dacd793b7f5eb139d9ade9c78d8a93b8 5.2/en/os/alpha/tmpwatch-2.8-0.5.x.alpha.rpm d35d61a8171407d381884a45ff0b8254 5.2/en/os/i386/tmpwatch-2.8-0.5.x.i386.rpm 61f7df3e30b380ed7f27d0db8f7a9b7e 5.2/en/os/sparc/tmpwatch-2.8-0.5.x.sparc.rpm 877cae10832b7334011d16bb718efb57 6.2/en/os/SRPMS/tmpwatch-2.8-0.6.x.src.rpm 4171f8fb2d7e28fad7fc767c67d20ea9 6.2/en/os/alpha/tmpwatch-2.8-0.6.x.alpha.rpm 845192bdfe16e48578607afd614d4d91 6.2/en/os/i386/tmpwatch-2.8-0.6.x.i386.rpm 885ca5c74bd6a04ddbee6bc4ff7a5078 6.2/en/os/sparc/tmpwatch-2.8-0.6.x.sparc.rpm 32c5840685e5c7f27a931b71fbbc0f43 7.0/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm 23c87a9dc22b563a7a621896de2873f8 7.0/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm 56ad67a94033fd3a856b015f44f30e36 7.0/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm 32c5840685e5c7f27a931b71fbbc0f43 7.1/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm 23c87a9dc22b563a7a621896de2873f8 7.1/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm 56ad67a94033fd3a856b015f44f30e36 7.1/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm 7873fc82cf1417bf0f74273f063f58e7 7.1/en/os/ia64/tmpwatch-2.8-0.7.x.ia64.rpm 27cb65abf996a15030045aff656f82a5 7.2/en/os/SRPMS/tmpwatch-2.8.1-1.src.rpm 5d11ca1e6fa0bcf1c49410355cb03784 7.2/en/os/i386/tmpwatch-2.8.1-1.i386.rpm 351aeba5b7a11b53f169aa4b3163b548 7.2/en/os/ia64/tmpwatch-2.8.1-1.ia64.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Copyright(c) 2000, 2001, 2002 Red Hat, Inc.
[Home] [Red Hat General] [Fedora Legacy] [Red Hat Development] [Red Hat Install] [Kernel] [Netfilter] [Linux Security] [Hot Springs] [Fedora Announce]