Skip to navigation

Bug Fix Advisory rusers bug fix update

Advisory: RHBA-2012:0404-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-03-20
Last updated on: 2012-06-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated rusers packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The rusers program allows users to find out who is logged into various machines
on the local network. The rusers command produces output similar to output of
the who utility, but for the specified list of hosts or for all machines on the
local network.

This update fixes the following bug:

* Previously, no dependency on the rpcbind package was specified in the rstatd
and rusers SysV init scripts. In addition, when the rstatd and rusersd services
were started, a check to see if networking was enabled was not performed, and an
incorrect exit code was returned. This update adds rpcbind dependency to the
rusersd and rstatd init scripts. Also, the SysV init scripts have been adjusted
to return correct exit codes. Checks are now performed when starting the rstatd
and rusersd services to see whether networking is available and binding to
rpcbind was successful. (BZ#697862)

All users of rusers are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
rusers-0.17-61.el6.src.rpm     MD5: af1d45987c52d2820d1dd66d30b3070e
SHA-256: e6db2144ae62be59b98651d6db62502c8d0750286e62aeb32244adf8f93a592b
 
IA-32:
rusers-0.17-61.el6.i686.rpm     MD5: c4621768869ca3af2c09b13c0ab1a5d9
SHA-256: d3c4ebb2d82c1a6a5b6880387f1a49b3c10fb603313f7d3b8348ea4ebb7b9704
rusers-debuginfo-0.17-61.el6.i686.rpm     MD5: 908e728fe5775edb4a1a07a5956bc9d0
SHA-256: 305684e117f092fd70aa49a914c20688068807c699fd45c31576733799100353
rusers-server-0.17-61.el6.i686.rpm     MD5: fca334bd312a7ac9e03eeec79db3c1fa
SHA-256: 5ba66889a3b79b49f88642d405f6c0c11421958be55399c48c0339b669282772
 
x86_64:
rusers-0.17-61.el6.x86_64.rpm     MD5: 4609d71ad5be2bcfcacad38d04bc0213
SHA-256: 6333a08c7d32686c6e056b03b098eada5961a6959d6deb760855a29146dbb2af
rusers-debuginfo-0.17-61.el6.x86_64.rpm     MD5: 1c7da5ba6cc228301a7ed93b9b5a78ea
SHA-256: b25eb0d1f799c17b168f428a3d05be3d3e4cd5d2550f0774caaa467a4bab3a0a
rusers-server-0.17-61.el6.x86_64.rpm     MD5: 7f29b809341f16a551294d24023b5647
SHA-256: c4e34a97044f92aad4006aa12985fb594eba64a88523f9ac9ec2d021b3d78670
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
rusers-0.17-61.el6.src.rpm     MD5: af1d45987c52d2820d1dd66d30b3070e
SHA-256: e6db2144ae62be59b98651d6db62502c8d0750286e62aeb32244adf8f93a592b
 
x86_64:
rusers-0.17-61.el6.x86_64.rpm     MD5: 4609d71ad5be2bcfcacad38d04bc0213
SHA-256: 6333a08c7d32686c6e056b03b098eada5961a6959d6deb760855a29146dbb2af
rusers-debuginfo-0.17-61.el6.x86_64.rpm     MD5: 1c7da5ba6cc228301a7ed93b9b5a78ea
SHA-256: b25eb0d1f799c17b168f428a3d05be3d3e4cd5d2550f0774caaa467a4bab3a0a
rusers-server-0.17-61.el6.x86_64.rpm     MD5: 7f29b809341f16a551294d24023b5647
SHA-256: c4e34a97044f92aad4006aa12985fb594eba64a88523f9ac9ec2d021b3d78670
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
rusers-0.17-61.el6.src.rpm     MD5: af1d45987c52d2820d1dd66d30b3070e
SHA-256: e6db2144ae62be59b98651d6db62502c8d0750286e62aeb32244adf8f93a592b
 
IA-32:
rusers-0.17-61.el6.i686.rpm     MD5: c4621768869ca3af2c09b13c0ab1a5d9
SHA-256: d3c4ebb2d82c1a6a5b6880387f1a49b3c10fb603313f7d3b8348ea4ebb7b9704
rusers-debuginfo-0.17-61.el6.i686.rpm     MD5: 908e728fe5775edb4a1a07a5956bc9d0
SHA-256: 305684e117f092fd70aa49a914c20688068807c699fd45c31576733799100353
rusers-server-0.17-61.el6.i686.rpm     MD5: fca334bd312a7ac9e03eeec79db3c1fa
SHA-256: 5ba66889a3b79b49f88642d405f6c0c11421958be55399c48c0339b669282772
 
PPC:
rusers-0.17-61.el6.ppc64.rpm     MD5: 61a529dca4a40b6d52db36f4ada0b654
SHA-256: 571b2e567e6014733700c1834ba2fa189a80cc541c64ff0bbfc9f69ca819a24c
rusers-debuginfo-0.17-61.el6.ppc64.rpm     MD5: 56db8f27286ae6f8aae4bc50d57ecd30
SHA-256: 1199265129c0387c73da9c160b405c2b3c3f15fab2369e7dcb4ad4025d338f69
rusers-server-0.17-61.el6.ppc64.rpm     MD5: f5289ebb2f7f465f57e05d4bd83428f5
SHA-256: 9d0e2c4929891ff4a512e6214268ad4a6289a9f602f1fc1eaac6c5e965d90949
 
s390x:
rusers-0.17-61.el6.s390x.rpm     MD5: a69d603a2e256ab2c67b3e0381706b6d
SHA-256: a8f2e655b2c9bd89cb19c67c07003aba106e7dbb4d983c3457a918f21919d252
rusers-debuginfo-0.17-61.el6.s390x.rpm     MD5: 2b64b284deb8ccf0ac2652c31ed7a76d
SHA-256: 9821162b67cb51278e68dec2ff928992af214007df2b3a7a3f79e49f7950896f
rusers-server-0.17-61.el6.s390x.rpm     MD5: 4707d93f740272cb35e32c9c2749acdf
SHA-256: 795da0792241f3519444a3a3136825ce618e27cbf02576704d8f0ed7d8c383f4
 
x86_64:
rusers-0.17-61.el6.x86_64.rpm     MD5: 4609d71ad5be2bcfcacad38d04bc0213
SHA-256: 6333a08c7d32686c6e056b03b098eada5961a6959d6deb760855a29146dbb2af
rusers-debuginfo-0.17-61.el6.x86_64.rpm     MD5: 1c7da5ba6cc228301a7ed93b9b5a78ea
SHA-256: b25eb0d1f799c17b168f428a3d05be3d3e4cd5d2550f0774caaa467a4bab3a0a
rusers-server-0.17-61.el6.x86_64.rpm     MD5: 7f29b809341f16a551294d24023b5647
SHA-256: c4e34a97044f92aad4006aa12985fb594eba64a88523f9ac9ec2d021b3d78670
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
rusers-0.17-61.el6.src.rpm     MD5: af1d45987c52d2820d1dd66d30b3070e
SHA-256: e6db2144ae62be59b98651d6db62502c8d0750286e62aeb32244adf8f93a592b
 
IA-32:
rusers-0.17-61.el6.i686.rpm     MD5: c4621768869ca3af2c09b13c0ab1a5d9
SHA-256: d3c4ebb2d82c1a6a5b6880387f1a49b3c10fb603313f7d3b8348ea4ebb7b9704
rusers-debuginfo-0.17-61.el6.i686.rpm     MD5: 908e728fe5775edb4a1a07a5956bc9d0
SHA-256: 305684e117f092fd70aa49a914c20688068807c699fd45c31576733799100353
rusers-server-0.17-61.el6.i686.rpm     MD5: fca334bd312a7ac9e03eeec79db3c1fa
SHA-256: 5ba66889a3b79b49f88642d405f6c0c11421958be55399c48c0339b669282772
 
x86_64:
rusers-0.17-61.el6.x86_64.rpm     MD5: 4609d71ad5be2bcfcacad38d04bc0213
SHA-256: 6333a08c7d32686c6e056b03b098eada5961a6959d6deb760855a29146dbb2af
rusers-debuginfo-0.17-61.el6.x86_64.rpm     MD5: 1c7da5ba6cc228301a7ed93b9b5a78ea
SHA-256: b25eb0d1f799c17b168f428a3d05be3d3e4cd5d2550f0774caaa467a4bab3a0a
rusers-server-0.17-61.el6.x86_64.rpm     MD5: 7f29b809341f16a551294d24023b5647
SHA-256: c4e34a97044f92aad4006aa12985fb594eba64a88523f9ac9ec2d021b3d78670
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

634922 - rpmlint errors and warnings



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/