[RHBA-2001:104-09] New tmpwatch package fixes cron warning

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          New tmpwatch package fixes cron warning
Advisory ID:       RHBA-2001:104-09
Issue date:        2001-08-28
Updated on:        2002-02-04
Product:           Red Hat Linux
Keywords:          tmpwatch cron man
Cross references:  RHSA-2001:072
Obsoletes:         RHSA-2000:080
---------------------------------------------------------------------

1. Topic:

The man update (RHSA-2001:072) removed several cache directories in /var 
that tmpwatch cleans up on a nightly basis.  This update provides a new 
cron script for tmpwatch that verifies the existence of cache directories 
before cleaning is attempted.

2. Relevant releases/architectures:

Red Hat Linux 5.2 - alpha, i386, sparc

Red Hat Linux 6.2 - alpha, i386, sparc

Red Hat Linux 7.0 - alpha, i386

Red Hat Linux 7.1 - alpha, i386, ia64

Red Hat Linux 7.2 - i386, ia64

3. Problem description:

tmpwatch is a program that runs nightly, and cleans up old temporary 
files that are older than a certain date.  As shipped in Red Hat Linux 
5.x, 6.x, and 7.x, tmpwatch cleans up cached man pages stored in 
directories under /var.  A recent man security update (RHSA-2001:072) 
removed these directories.  The symptom of this is that cron, the Linux 
periodic job scheduler, will report errors from the tmpwatch service on a 
nightly basis.  The messages are similar to the following:

  /etc/cron.daily/tmpwatch:
 
  error: lstat() of directory /var/cache/man/X11R6/cat? failed: No such
  file or directory

Note that these messages do not affect the tmpwatch service.

The new tmpwatch will check for the existence of the manual page cache 
directories before attempting to clean them, stopping the messages from 
the cron service.

In addition, the new tmpwatch adds some new functionality and fixes a few 
minor bugs present in previous releases.  See the RPM changelog for 
details.

2001-11-28: an issue that only surfaces on systems upgraded to Red Hat 
Linux 7.2 where filesystems were converted from ext2 to ext3 format has 
been fixed.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

47784 - man problem after an update
56815 - /etc/fstab update failure

6. RPMs required:

Red Hat Linux 5.2:

SRPMS:
ftp://updates.redhat.com/5.2/en/os/SRPMS/tmpwatch-2.8-0.5.x.src.rpm

alpha:
ftp://updates.redhat.com/5.2/en/os/alpha/tmpwatch-2.8-0.5.x.alpha.rpm

i386:
ftp://updates.redhat.com/5.2/en/os/i386/tmpwatch-2.8-0.5.x.i386.rpm

sparc:
ftp://updates.redhat.com/5.2/en/os/sparc/tmpwatch-2.8-0.5.x.sparc.rpm

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/tmpwatch-2.8-0.6.x.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/tmpwatch-2.8-0.6.x.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/tmpwatch-2.8-0.6.x.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/tmpwatch-2.8-0.6.x.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/tmpwatch-2.8-0.7.x.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/tmpwatch-2.8.1-1.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/tmpwatch-2.8.1-1.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/tmpwatch-2.8.1-1.ia64.rpm

7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
0168c76dabc604362835ad1b6c2a80e9 5.2/en/os/SRPMS/tmpwatch-2.8-0.5.x.src.rpm
dacd793b7f5eb139d9ade9c78d8a93b8 5.2/en/os/alpha/tmpwatch-2.8-0.5.x.alpha.rpm
d35d61a8171407d381884a45ff0b8254 5.2/en/os/i386/tmpwatch-2.8-0.5.x.i386.rpm
61f7df3e30b380ed7f27d0db8f7a9b7e 5.2/en/os/sparc/tmpwatch-2.8-0.5.x.sparc.rpm
877cae10832b7334011d16bb718efb57 6.2/en/os/SRPMS/tmpwatch-2.8-0.6.x.src.rpm
4171f8fb2d7e28fad7fc767c67d20ea9 6.2/en/os/alpha/tmpwatch-2.8-0.6.x.alpha.rpm
845192bdfe16e48578607afd614d4d91 6.2/en/os/i386/tmpwatch-2.8-0.6.x.i386.rpm
885ca5c74bd6a04ddbee6bc4ff7a5078 6.2/en/os/sparc/tmpwatch-2.8-0.6.x.sparc.rpm
32c5840685e5c7f27a931b71fbbc0f43 7.0/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm
23c87a9dc22b563a7a621896de2873f8 7.0/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm
56ad67a94033fd3a856b015f44f30e36 7.0/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm
32c5840685e5c7f27a931b71fbbc0f43 7.1/en/os/SRPMS/tmpwatch-2.8-0.7.x.src.rpm
23c87a9dc22b563a7a621896de2873f8 7.1/en/os/alpha/tmpwatch-2.8-0.7.x.alpha.rpm
56ad67a94033fd3a856b015f44f30e36 7.1/en/os/i386/tmpwatch-2.8-0.7.x.i386.rpm
7873fc82cf1417bf0f74273f063f58e7 7.1/en/os/ia64/tmpwatch-2.8-0.7.x.ia64.rpm
27cb65abf996a15030045aff656f82a5 7.2/en/os/SRPMS/tmpwatch-2.8.1-1.src.rpm
5d11ca1e6fa0bcf1c49410355cb03784 7.2/en/os/i386/tmpwatch-2.8.1-1.i386.rpm
351aeba5b7a11b53f169aa4b3163b548 7.2/en/os/ia64/tmpwatch-2.8.1-1.ia64.rpm 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:




Copyright(c) 2000, 2001, 2002 Red Hat, Inc.





[Index of Archives]     [Red Hat General]     [Fedora Legacy]     [Red Hat Development]     [Red Hat Install]     [Kernel]     [Netfilter]     [Linux Security]     [Fedora Announce]

Powered by Linux