Skip to navigation

Bug Fix Advisory rsh bug fix update

Advisory: RHBA-2011:1429-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-11-07
Last updated on: 2011-11-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated rsh packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The rsh packages contain programs which allow users to run commands on remote
machines, log in to other machines, copy files between machines (rsh, rlogin and
rcp), and provide an alternate method of executing remote commands (rexec). All
of these programs are run by the xinetd daemon and can be configured using the
Pluggable Authentication Modules (PAM) system and configuration files in the
/etc/xinetd.d/ directory.

This update fixes the following bug:

* The rshd daemon performed redundant calls of the setpwent and endpwent
functions. As a consequence, rshd queried NIS servers with every rsh access.
With this update, these redundant calls were removed so that rshd no longer
contacts NIS servers unnecessarily. (BZ#749322)

All users of rsh are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
rsh-0.17-40.el5_7.1.src.rpm     MD5: bf669b3e26e34e905b93e9ddf5de0144
SHA-256: 74697438e3c2831d83fcbae802db65a6ce72d41d9cc49bd704a59dabfb102620
 
IA-32:
rsh-0.17-40.el5_7.1.i386.rpm     MD5: 76a4a072fe9796c38561760e40f6c7ac
SHA-256: 710ace211c41c95f68e5de6cae78a69c991818aaa2b63ca99a06a49853794a9a
rsh-server-0.17-40.el5_7.1.i386.rpm     MD5: cc2d4afd7e22bcd59511da988eddf1cc
SHA-256: c6de9fedf17bceb524170dc78a57f4b709fff876420dc1fb7b13da091fc3724b
 
IA-64:
rsh-0.17-40.el5_7.1.ia64.rpm     MD5: feeb5354f09650062038c4815edbe15c
SHA-256: c7ffe409f2a5f8a1922638cb0d170f16857ee391118ae83ca33ff3db9414bec5
rsh-server-0.17-40.el5_7.1.ia64.rpm     MD5: 352f184ade6c8df18e87e5efc4890fcf
SHA-256: 22ec44a8c940b1e47ac239a375e0bf74f361ece1d6d1dcd67408da34462f7a03
 
PPC:
rsh-0.17-40.el5_7.1.ppc.rpm     MD5: 738c0c782ed8af55034627ab82c3a9b1
SHA-256: d3603404f1c2f6c9e4bb75fea65a5ebfa62ee791e2ba80d9ca53dc7bbe00016b
rsh-server-0.17-40.el5_7.1.ppc.rpm     MD5: 21748f36ef606226feb41d2d531cd1e7
SHA-256: b100b6bf0816921edf7f851aff0cab8314126085b66037d6dc65565a7c539a59
 
s390x:
rsh-0.17-40.el5_7.1.s390x.rpm     MD5: dde76228b0efc3cbb5212846d8bb8215
SHA-256: 2ae371f88cb00b1801d36f4432ff8ffc73e7f4759cb623f9e839ae8de420a0f5
rsh-server-0.17-40.el5_7.1.s390x.rpm     MD5: e09aa73a8dba12ae2f3cc59b1b3adbf5
SHA-256: 16286e7db146343bb9f6cac4435f9d75cd0a675bc6db0a55a5d4691a4d1db0f1
 
x86_64:
rsh-0.17-40.el5_7.1.x86_64.rpm     MD5: d24e572b86032dfea5b6c455e8103701
SHA-256: 5a3ce738145960cd292e54a993a3704b002552be7e4629660d7c7315ec9ec4d9
rsh-server-0.17-40.el5_7.1.x86_64.rpm     MD5: 99046cc837cbdab34e9084d20af4e2f6
SHA-256: 0ef1db595dcf81f6b4c2ff48112ce4de833da45bd10068930b49498d7a2a6e14
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
rsh-0.17-40.el5_7.1.src.rpm     MD5: bf669b3e26e34e905b93e9ddf5de0144
SHA-256: 74697438e3c2831d83fcbae802db65a6ce72d41d9cc49bd704a59dabfb102620
 
IA-32:
rsh-0.17-40.el5_7.1.i386.rpm     MD5: 76a4a072fe9796c38561760e40f6c7ac
SHA-256: 710ace211c41c95f68e5de6cae78a69c991818aaa2b63ca99a06a49853794a9a
rsh-server-0.17-40.el5_7.1.i386.rpm     MD5: cc2d4afd7e22bcd59511da988eddf1cc
SHA-256: c6de9fedf17bceb524170dc78a57f4b709fff876420dc1fb7b13da091fc3724b
 
x86_64:
rsh-0.17-40.el5_7.1.x86_64.rpm     MD5: d24e572b86032dfea5b6c455e8103701
SHA-256: 5a3ce738145960cd292e54a993a3704b002552be7e4629660d7c7315ec9ec4d9
rsh-server-0.17-40.el5_7.1.x86_64.rpm     MD5: 99046cc837cbdab34e9084d20af4e2f6
SHA-256: 0ef1db595dcf81f6b4c2ff48112ce4de833da45bd10068930b49498d7a2a6e14
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

endpwent, rsh, setpwent


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/