- Issued:
- 2007-11-15
- Updated:
- 2007-11-15
RHBA-2007:1012 - Bug Fix Advisory
Synopsis
telnet-server bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated telnet-server packages that fixe a bug are now available.
Description
Telnet is a popular protocol for logging in to remote systems over the
Internet. The telnet-server package includes a telnet daemon that
supports remote logins into the host machine. The telnet daemon is
disabled by default.
The telnet daemon refused connections when the reverse records for the
host you were connecting to did not exist, for example, when configured
nameservers were unavailable, and the host you were connecting to was not
in "/etc/hosts". Telnet sessions would terminate with a "Temporary failure
in name resolution: Illegal seek" error.
Users of the telnet-server packages are advised to upgrade to these
updated packages, which resolve this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 253392 - telnetd refuses connections if nameserver(s) down
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
telnet-0.17-39.el5.src.rpm | SHA-256: 15d55a2c853789bc7e4a390e5b2eb3f3064194451de96b14cd26bc54e127eb39 |
x86_64 | |
telnet-0.17-39.el5.x86_64.rpm | SHA-256: cb6240f3a0fec038b4aae20ab9312a95a633ecf9ece44ec82d67bce3b66b2659 |
telnet-server-0.17-39.el5.x86_64.rpm | SHA-256: dd09f14bb360b88112996ee71bcc5fa53763a5ad79db0cf11f15eb31f46ed96b |
ia64 | |
telnet-0.17-39.el5.ia64.rpm | SHA-256: 073e095c42a274644733dd54b9c78d0f46cd555ae36c98a4bd36ac6ae5601bba |
telnet-server-0.17-39.el5.ia64.rpm | SHA-256: 40a15f561e598312778addfa5b2caffb0beba3f0a892f4f9f121c0ad6b5f6e34 |
i386 | |
telnet-0.17-39.el5.i386.rpm | SHA-256: f7c7a2f44a9179dda56d085839226884bda0d3cad13cecc2a8087c81cf0f4c87 |
telnet-server-0.17-39.el5.i386.rpm | SHA-256: aa1b55f7581f1d66706388ef95252b45e9a5406a8ce6f7d84675252e727b5758 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
telnet-0.17-39.el5.src.rpm | SHA-256: 15d55a2c853789bc7e4a390e5b2eb3f3064194451de96b14cd26bc54e127eb39 |
x86_64 | |
telnet-0.17-39.el5.x86_64.rpm | SHA-256: cb6240f3a0fec038b4aae20ab9312a95a633ecf9ece44ec82d67bce3b66b2659 |
telnet-server-0.17-39.el5.x86_64.rpm | SHA-256: dd09f14bb360b88112996ee71bcc5fa53763a5ad79db0cf11f15eb31f46ed96b |
i386 | |
telnet-0.17-39.el5.i386.rpm | SHA-256: f7c7a2f44a9179dda56d085839226884bda0d3cad13cecc2a8087c81cf0f4c87 |
telnet-server-0.17-39.el5.i386.rpm | SHA-256: aa1b55f7581f1d66706388ef95252b45e9a5406a8ce6f7d84675252e727b5758 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
telnet-0.17-39.el5.src.rpm | SHA-256: 15d55a2c853789bc7e4a390e5b2eb3f3064194451de96b14cd26bc54e127eb39 |
x86_64 | |
telnet-0.17-39.el5.x86_64.rpm | SHA-256: cb6240f3a0fec038b4aae20ab9312a95a633ecf9ece44ec82d67bce3b66b2659 |
telnet-server-0.17-39.el5.x86_64.rpm | SHA-256: dd09f14bb360b88112996ee71bcc5fa53763a5ad79db0cf11f15eb31f46ed96b |
i386 | |
telnet-0.17-39.el5.i386.rpm | SHA-256: f7c7a2f44a9179dda56d085839226884bda0d3cad13cecc2a8087c81cf0f4c87 |
telnet-server-0.17-39.el5.i386.rpm | SHA-256: aa1b55f7581f1d66706388ef95252b45e9a5406a8ce6f7d84675252e727b5758 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
telnet-0.17-39.el5.src.rpm | SHA-256: 15d55a2c853789bc7e4a390e5b2eb3f3064194451de96b14cd26bc54e127eb39 |
s390x | |
telnet-0.17-39.el5.s390x.rpm | SHA-256: 9003f722b2de3a7dc565635b81550d977bd42ec50026782ef18fd350695ee245 |
telnet-server-0.17-39.el5.s390x.rpm | SHA-256: f386fdee686088f0fc8f0dbe51b36226950f544aeb74a1f1c3e3d44b2b04b8de |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
telnet-0.17-39.el5.src.rpm | SHA-256: 15d55a2c853789bc7e4a390e5b2eb3f3064194451de96b14cd26bc54e127eb39 |
ppc | |
telnet-0.17-39.el5.ppc.rpm | SHA-256: 12bbcb7796f24e436df8d0f5a909afef28bb6243451fdeab2510cb553e5563df |
telnet-server-0.17-39.el5.ppc.rpm | SHA-256: 002ce6fb709f4ee0da39c35d0d69ed41c50648ea538bcd33d064887cc0217803 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
telnet-0.17-39.el5.src.rpm | SHA-256: 15d55a2c853789bc7e4a390e5b2eb3f3064194451de96b14cd26bc54e127eb39 |
x86_64 | |
telnet-0.17-39.el5.x86_64.rpm | SHA-256: cb6240f3a0fec038b4aae20ab9312a95a633ecf9ece44ec82d67bce3b66b2659 |
telnet-server-0.17-39.el5.x86_64.rpm | SHA-256: dd09f14bb360b88112996ee71bcc5fa53763a5ad79db0cf11f15eb31f46ed96b |
i386 | |
telnet-0.17-39.el5.i386.rpm | SHA-256: f7c7a2f44a9179dda56d085839226884bda0d3cad13cecc2a8087c81cf0f4c87 |
telnet-server-0.17-39.el5.i386.rpm | SHA-256: aa1b55f7581f1d66706388ef95252b45e9a5406a8ce6f7d84675252e727b5758 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.