Skip to navigation

Bug Fix Advisory logrotate bug fix update

Advisory: RHBA-2012:1172-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-08-15
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated logrotate packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The logrotate utility simplifies the administration of multiple log files,
allowing the automatic rotation, compression, removal, and mailing of log files.

This update fixes the following bug:

* Attempting to send a file to a specific e-mail address failed if the
"mailfirst" and "delaycompress" options were used at the same time. This was
because logrotate searched for a file with the "gz" suffix, however the file had
not yet been compressed. The underlying source code has been modified, and
logrotate correctly finds and sends the file under these circumstances.
(BZ#827570)

All users of logrotate are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
logrotate-3.7.8-16.el6.src.rpm
File outdated by:  RHBA-2013:1095
    MD5: 71c9d7f5dea73ea1e7274cedcc676730
SHA-256: 2ff46ee8a59905ff4672fd887b711209fd9a77584a4104c8b33f300074001ea9
 
IA-32:
logrotate-3.7.8-16.el6.i686.rpm
File outdated by:  RHBA-2013:1095
    MD5: d657c49369b77f474dc36f3a3bf3ce4c
SHA-256: aa1152209dbf635033f19c61c697cfb346d413d5230d670a8227891d11eca8e9
logrotate-debuginfo-3.7.8-16.el6.i686.rpm
File outdated by:  RHBA-2013:1095
    MD5: 107369c10d907116d3233360fcf7b756
SHA-256: c3408f3bac5e06b732421da3428886f2f8525c1b00527093b62e485a9033a2d0
 
x86_64:
logrotate-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 7e5bdbb8ac63c5deaf48f8bb0ff9e366
SHA-256: 884ddfb0dbd3966e4e8b95d86a058b38812d0befe41d785a08527a6a1121a7f1
logrotate-debuginfo-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 44906cb96e177c6ec17cb152a8009d7e
SHA-256: bbcf1f07a0b6a2a0a83044746bbfeaa2ae4dfee7e4adc2d1673b4e777b5062f1
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
logrotate-3.7.8-16.el6.src.rpm
File outdated by:  RHBA-2013:1095
    MD5: 71c9d7f5dea73ea1e7274cedcc676730
SHA-256: 2ff46ee8a59905ff4672fd887b711209fd9a77584a4104c8b33f300074001ea9
 
x86_64:
logrotate-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 7e5bdbb8ac63c5deaf48f8bb0ff9e366
SHA-256: 884ddfb0dbd3966e4e8b95d86a058b38812d0befe41d785a08527a6a1121a7f1
logrotate-debuginfo-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 44906cb96e177c6ec17cb152a8009d7e
SHA-256: bbcf1f07a0b6a2a0a83044746bbfeaa2ae4dfee7e4adc2d1673b4e777b5062f1
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
logrotate-3.7.8-16.el6.src.rpm
File outdated by:  RHBA-2013:1095
    MD5: 71c9d7f5dea73ea1e7274cedcc676730
SHA-256: 2ff46ee8a59905ff4672fd887b711209fd9a77584a4104c8b33f300074001ea9
 
IA-32:
logrotate-3.7.8-16.el6.i686.rpm
File outdated by:  RHBA-2013:1095
    MD5: d657c49369b77f474dc36f3a3bf3ce4c
SHA-256: aa1152209dbf635033f19c61c697cfb346d413d5230d670a8227891d11eca8e9
logrotate-debuginfo-3.7.8-16.el6.i686.rpm
File outdated by:  RHBA-2013:1095
    MD5: 107369c10d907116d3233360fcf7b756
SHA-256: c3408f3bac5e06b732421da3428886f2f8525c1b00527093b62e485a9033a2d0
 
PPC:
logrotate-3.7.8-16.el6.ppc64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 4fe1a864dcbdceaa49a42843e84b83d8
SHA-256: d76e22680ed0a28ea8c0ef6b012b25909ab36df79d4b5278a517d7fee3f89c12
logrotate-debuginfo-3.7.8-16.el6.ppc64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 2edc6ab6d49b3eadbf8fb84c762ae73c
SHA-256: 38165f85e52b5edca72e42ab4d3fe3b6a386a9bfc42f8b135d88e2b8fc7d6aae
 
s390x:
logrotate-3.7.8-16.el6.s390x.rpm
File outdated by:  RHBA-2013:1095
    MD5: d81e2adbd432e708ae880e4da44c0d1f
SHA-256: d20e63ebc9a41bf660c82a0e902bf7c76ae692cc20619dd59a899aacde4035d1
logrotate-debuginfo-3.7.8-16.el6.s390x.rpm
File outdated by:  RHBA-2013:1095
    MD5: d459bc38f9a5e8f9d37832d9ffd1eed2
SHA-256: 777976b3e8873a2aa4d6532bc4cdbb89aeaf87d64c0e86aae7acf33dc7d1cff2
 
x86_64:
logrotate-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 7e5bdbb8ac63c5deaf48f8bb0ff9e366
SHA-256: 884ddfb0dbd3966e4e8b95d86a058b38812d0befe41d785a08527a6a1121a7f1
logrotate-debuginfo-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 44906cb96e177c6ec17cb152a8009d7e
SHA-256: bbcf1f07a0b6a2a0a83044746bbfeaa2ae4dfee7e4adc2d1673b4e777b5062f1
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
logrotate-3.7.8-16.el6.src.rpm
File outdated by:  RHBA-2013:1095
    MD5: 71c9d7f5dea73ea1e7274cedcc676730
SHA-256: 2ff46ee8a59905ff4672fd887b711209fd9a77584a4104c8b33f300074001ea9
 
IA-32:
logrotate-3.7.8-16.el6.i686.rpm
File outdated by:  RHBA-2013:1095
    MD5: d657c49369b77f474dc36f3a3bf3ce4c
SHA-256: aa1152209dbf635033f19c61c697cfb346d413d5230d670a8227891d11eca8e9
logrotate-debuginfo-3.7.8-16.el6.i686.rpm
File outdated by:  RHBA-2013:1095
    MD5: 107369c10d907116d3233360fcf7b756
SHA-256: c3408f3bac5e06b732421da3428886f2f8525c1b00527093b62e485a9033a2d0
 
x86_64:
logrotate-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 7e5bdbb8ac63c5deaf48f8bb0ff9e366
SHA-256: 884ddfb0dbd3966e4e8b95d86a058b38812d0befe41d785a08527a6a1121a7f1
logrotate-debuginfo-3.7.8-16.el6.x86_64.rpm
File outdated by:  RHBA-2013:1095
    MD5: 44906cb96e177c6ec17cb152a8009d7e
SHA-256: bbcf1f07a0b6a2a0a83044746bbfeaa2ae4dfee7e4adc2d1673b4e777b5062f1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

827570 - logrotate fails to find the file to mail, with the "mailfirst" and "delaycompress" options


Keywords

logrotate


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/