---

Red Hat Errata Advisory: New Update Agent packages available

Date: Wed, 3 Nov 1999 16:08:10 -0500 (EST)
From: Preston Brown <<a
href=”mailto:pbrown@redhat.com”>pbrown@redhat.com>
To: redhat-watch-list@redhat.com


Red Hat, Inc. Errata Advisory

Synopsis: Improved version of Update Agent available
Advisory ID: RHEA-1999:049-02
Issue date: 1999-11-01
Updated On: 1999-11-03
Keywords: abort up2date e-mail notification password


1. Topic:

An improved version of the Red Hat Update Agent is now
available. Visual confirmation of success or failure is provided at
the end of each update run. In addition, a summary of the run is
mailed to the
address(es) configured to receive e-mail notifications. This new
version also makes the “Abort” button much more responsive than it
was previously, corrects password problems, and fixes several other
smaller bugs.

2. Bug IDs fixed (http://developer.redhat.com/bugzilla
for more info):

6568 6675

3. Relevant releases/architectures:

Red Hat Linux 6.1, all architectures

4. Obsoleted by:

5. Conflicts with:

6. RPMs required:

Architecture neutral:
ftp://updates.redhat.com/6.1/noarch/up2date-1.0.6-1.noarch.rpm

Source packages:
ftp://updates.redhat.com/6.1/SRPMS/up2date-1.0.6-1.src.rpm

7. Problem description:

Abort button was almost non-functional in many cases. E-mail was
not sent upon completion of an update run. The list of packages
which the Update Agent determined should be skipped was displayed
before determining if the packages were actually present on the
updates server.

(1999-11-03) Passwords made up of only numbers caused
failures.

8. Solution:

For each RPM for your particular architecture, run:
rpm -Uvh
where filename is the name of the RPM.

9. Verification:

MD5 sum                           Package Name 


7666a407c4023fff8496100a4bb16e38 noarch/up2date-1.0.6-1.noarch.rpm
0e0f0572b47b8d258d01eba5e49f3958 SRPMS/up2date-1.0.6-1.src.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm –checksig

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg

10. References:

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis