Bug 5695 - improper upgrade
improper upgrade
Status: CLOSED CURRENTRELEASE
Product: Red Hat Linux
Classification: Retired
Component: linuxconf (Show other bugs)
6.1
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Michael K. Johnson
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 1999-10-07 15:42 EDT by Wil Harris
Modified: 2008-05-01 11:37 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 1999-11-24 11:09:22 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Wil Harris 1999-10-07 15:42:07 EDT
During the upgrade of Linuxconf it continuely adds to the
/etc/inetd.conf file rather than checking to see if it
already has an entry. This causes the /etc/inetd.conf file
to end up looking like:

linuxconf stream tcp wait root /bin/linuxconf linuxconf
--http
#swat      stream  tcp     nowait.400      root
/usr/sbin/swat swat
#swat      stream  tcp     nowait.400      root
/usr/sbin/swat swat

linuxconf stream tcp wait root /bin/linuxconf linuxconf
--http

linuxconf stream tcp wait root /bin/linuxconf linuxconf
--http
#swat      stream  tcp     nowait.400      root
/usr/sbin/swat swat

linuxconf stream tcp wait root /bin/linuxconf linuxconf
--http

linuxconf stream tcp wait root /bin/linuxconf linuxconf
--http

linuxconf stream tcp wait root /bin/linuxconf linuxconf
--http

linuxconf stream tcp wait root /bin/linuxconf linuxconf
--http
#swat      stream  tcp     nowait.400      root
/usr/sbin/swat swat
Comment 1 Michael K. Johnson 1999-11-24 11:09:59 EST
It used to do this, but has since been fixed.  However, we do not
attempt to remove the duplicate entries from inetd.conf, as they
are harmless and our attempts could easily do more harm than good.

Note You need to log in before you can comment on or make changes to this bug.