Skip to navigation

Bug Fix Advisory logwatch bug fix update

Advisory: RHBA-2012:1217-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated logwatch package that fixes various bugs is now available.

Logwatch is a customizable, pluggable log-monitoring system. It will go through
your logs for a given period of time and make a report in the areas that you
wish with the detail that you wish. Easy to use - works right out of the package
on many systems.

This updated logwatch package includes fixes for the following bugs:

* Due to an incorrect regular expression, positive changes in temperatures
reported by the smartd daemon were shown as unmatched entries in the logwatch
output. This update fixes the faulty regular expression and temperature log
information is now displayed correctly. (BZ#578806)

* Prior to this update, logwatch did not correctly parse the RSYSLOG_FileFormat
time stamps and displayed them as unmatched entries. With this update, parsing
of the rsyslog time stamps has been fixed and works as expected. (BZ#583607)

* Yum's "applydate" time ranges were not correctly parsed by logwatch and were
displayed as unmatched entries. This has been fixed and "applydate" time ranges
are no longer displayed as unmatched entries. (BZ#583721)

* Xen virtual console logins were not correctly parsed by logwatch and were
displayed as unmatched entries. This update fixes this bug. (BZ#595068)

* Logins initiated with the "su -" or "su -l" command were not correctly parsed
by logwatch and were displayed as unmatched entries. This update fixes this bug.
(BZ#668067)

* SSH Kerberos (GSS) logins were not correctly parsed by logwatch and were
displayed as unmatched entries. This update fixes this bug. (BZ#684577)

All users of logwatch are advised to upgrade to this updated package, which
fixes these bugs.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
logwatch-7.3-10.el5.src.rpm     MD5: 6c2c0446251d23a0412cc6009cfc477e
SHA-256: 4977ec8a0b502e77b227400c248a2dbcdb6afe16b54cf7152665650961a486e8
 
IA-32:
logwatch-7.3-10.el5.noarch.rpm     MD5: fe77a7e6b3fc33b29f88ff36b0c13ad7
SHA-256: 658e2be6d6a972348137e1eeda1fe7c62625067ad40443d21f0a3a011fbe69d9
 
IA-64:
logwatch-7.3-10.el5.noarch.rpm     MD5: fe77a7e6b3fc33b29f88ff36b0c13ad7
SHA-256: 658e2be6d6a972348137e1eeda1fe7c62625067ad40443d21f0a3a011fbe69d9
 
PPC:
logwatch-7.3-10.el5.noarch.rpm     MD5: fe77a7e6b3fc33b29f88ff36b0c13ad7
SHA-256: 658e2be6d6a972348137e1eeda1fe7c62625067ad40443d21f0a3a011fbe69d9
 
s390x:
logwatch-7.3-10.el5.noarch.rpm     MD5: fe77a7e6b3fc33b29f88ff36b0c13ad7
SHA-256: 658e2be6d6a972348137e1eeda1fe7c62625067ad40443d21f0a3a011fbe69d9
 
x86_64:
logwatch-7.3-10.el5.noarch.rpm     MD5: fe77a7e6b3fc33b29f88ff36b0c13ad7
SHA-256: 658e2be6d6a972348137e1eeda1fe7c62625067ad40443d21f0a3a011fbe69d9
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
logwatch-7.3-10.el5.src.rpm     MD5: 6c2c0446251d23a0412cc6009cfc477e
SHA-256: 4977ec8a0b502e77b227400c248a2dbcdb6afe16b54cf7152665650961a486e8
 
IA-32:
logwatch-7.3-10.el5.noarch.rpm     MD5: fe77a7e6b3fc33b29f88ff36b0c13ad7
SHA-256: 658e2be6d6a972348137e1eeda1fe7c62625067ad40443d21f0a3a011fbe69d9
 
x86_64:
logwatch-7.3-10.el5.noarch.rpm     MD5: fe77a7e6b3fc33b29f88ff36b0c13ad7
SHA-256: 658e2be6d6a972348137e1eeda1fe7c62625067ad40443d21f0a3a011fbe69d9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

578806 - does not properly parse temperature changes reported by smartd
583607 - logwatch must understand RSYSLOG_FileFormat timestamps
583721 - yum's applydate does not properly catch time ranges
595068 - Logins through xen virt console are under unmatched entries
668067 - logwatch shows unknown entries for su -
684577 - Logwatch does not recognise ssh Kerberos (GSS) logins.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/