Subject: [RHBA-2000:067-02] Updated mysql packages are available for Red Hat Linux 7.0 To: redhat-watch-list@redhat.com From: bugzilla@redhat.com Date: Tue, 26 Sep 2000 11:51 -0400 --------------------------------------------------------------------- Red Hat, Inc. Bug Fix Advisory Synopsis: Updated mysql packages are available for Red Hat Linux 7.0 Advisory ID: RHBA-2000:067-02 Issue date: 2000-09-26 Updated on: 2000-09-26 Product: Red Hat Linux Keywords: mysql permissions var.pid Cross references: N/A --------------------------------------------------------------------- 1. Topic: The mysql packages shipped with Red Hat Linux 7.0 have too restrictive permissions and have problems handling the pid file. 2. Relevant releases/architectures: Red Hat Linux 7.0 - i386 3. Problem description: The mysql packages shipped with Red Hat Linux 7.0 don't allow users to access the socket, causing the package to work for users "root" and "mysql" only. Also, the pid file handling has been fixed. 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 17432 - MySQL configuration file name changed, socket dir perms wrong 6. RPMs required: Red Hat Linux 7.0: i386: ftp://updates.redhat.com/7.0/i386/mysql-3.23.24-1.i386.rpm ftp://updates.redhat.com/7.0/i386/mysql-devel-3.23.24-1.i386.rpm ftp://updates.redhat.com/7.0/i386/mysql-server-3.23.24-1.i386.rpm sources: ftp://updates.redhat.com/7.0/SRPMS/mysql-3.23.24-1.src.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 829ff5a37c7f680a50fdb3599aa9b0cd 7.0/SRPMS/mysql-3.23.24-1.src.rpm c6cc84807fda482c40f2f13413e6dbba 7.0/i386/mysql-3.23.24-1.i386.rpm 55b4350d3457da84abc946650405489b 7.0/i386/mysql-devel-3.23.24-1.i386.rpm d6c51af11b65f76e5a1c10aec447ec6d 7.0/i386/mysql-server-3.23.24-1.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A Copyright(c) 2000 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list Redhat-watch-list@redhat.com https://listman.redhat.com/mailman/listinfo/redhat-watch-list