- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2012:1035 - Bug Fix Advisory
Synopsis
telnet bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated telnet packages that fix four bugs are now available for Red Hat
Enterprise Linux 5.
Description
Telnet is a popular protocol for logging in to remote systems over the Internet.
The telnet service is disabled by default.
This update fixes following bugs:
- Prior to this update, the telnet.spec file used the "%{dist}" macro instead of
the "%{?dist}", which violated packaging guidelines. This update replaces the
macro with the correct one. (BZ#440614)
- Prior to this update, the telnet utility used the sockaddr structure as
storage for IPv6 addresses. As a consequence, telnet could emit incomplete IPv6
addresses because the sockaddr structure is to small to hold an IPv6 address.
This update modifies telnet to use the sockaddr_storage structure as IPv6
address storage and now emits complete IPv6 addresses. (BZ#678336)
- Prior to this update, the telnet utility could enter an infinite loop when the
user specified the "-b" parameter with a non-existing network interface. This
update modifies the telnet command to print errors when users specify a
non-existing network interface. (BZ#772860)
- Prior to this update, the in.telnetd daemon could fail to update information
in the /var/run/utmp directory when a deadlock occured in a telnet session. This
update modifies telnetd to update /var/run/utmp correctly. (BZ#825946)
All users of telnet are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258/
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 440614 - there should be %{?dist} instead of %{dist} in the *.spec on the Release: line
- BZ - 678336 - telnetd sockaddr is too small for IPV6 connections
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
telnet-0.17-41.el5.src.rpm | SHA-256: e5666f6eaeaca4723c49780e5da63b529c6867b1a6200e386279b5ef8ca9a8d1 |
x86_64 | |
telnet-0.17-41.el5.x86_64.rpm | SHA-256: 6e5a0623ff69f0b45aa687d33d0d3d645000c5d6884b3994e4cf6a57320473e1 |
telnet-debuginfo-0.17-41.el5.x86_64.rpm | SHA-256: 1eb1532a61a109dba6a34a06ad654a32fd494c0e423c67a601ffc77aeb2ac790 |
telnet-server-0.17-41.el5.x86_64.rpm | SHA-256: 5609beaedcd20310918540dad8b9530e7635439267f1bdc15fc967024f171285 |
ia64 | |
telnet-0.17-41.el5.ia64.rpm | SHA-256: b20c23c6e672d7ba585c7f4b8112636d507f8a81e2265ddad2bbcf0f2dc5f191 |
telnet-debuginfo-0.17-41.el5.ia64.rpm | SHA-256: 577c1ec7beb40eb84997dee0beb01f2aafdb6a28bfa3f3487509689c51bc946e |
telnet-server-0.17-41.el5.ia64.rpm | SHA-256: a1d405158df22fc3f6a4e5f2805787ac7111f899b67dc670cb4a20b89155120c |
i386 | |
telnet-0.17-41.el5.i386.rpm | SHA-256: de6c541780b9c963f737f5c8d5ab70e360df20c4696cee8b63f8963e4c53f030 |
telnet-debuginfo-0.17-41.el5.i386.rpm | SHA-256: e19946883a0ba44863244c4c9ea3668cd168236aa1b5aaba84399d5ef21e86f4 |
telnet-server-0.17-41.el5.i386.rpm | SHA-256: 4ecdc079c375f7bec1c7bf88b692821f0e83fc98769d01fa39b7f7c99644281c |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
telnet-0.17-41.el5.src.rpm | SHA-256: e5666f6eaeaca4723c49780e5da63b529c6867b1a6200e386279b5ef8ca9a8d1 |
x86_64 | |
telnet-0.17-41.el5.x86_64.rpm | SHA-256: 6e5a0623ff69f0b45aa687d33d0d3d645000c5d6884b3994e4cf6a57320473e1 |
telnet-debuginfo-0.17-41.el5.x86_64.rpm | SHA-256: 1eb1532a61a109dba6a34a06ad654a32fd494c0e423c67a601ffc77aeb2ac790 |
telnet-server-0.17-41.el5.x86_64.rpm | SHA-256: 5609beaedcd20310918540dad8b9530e7635439267f1bdc15fc967024f171285 |
i386 | |
telnet-0.17-41.el5.i386.rpm | SHA-256: de6c541780b9c963f737f5c8d5ab70e360df20c4696cee8b63f8963e4c53f030 |
telnet-debuginfo-0.17-41.el5.i386.rpm | SHA-256: e19946883a0ba44863244c4c9ea3668cd168236aa1b5aaba84399d5ef21e86f4 |
telnet-server-0.17-41.el5.i386.rpm | SHA-256: 4ecdc079c375f7bec1c7bf88b692821f0e83fc98769d01fa39b7f7c99644281c |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
telnet-0.17-41.el5.src.rpm | SHA-256: e5666f6eaeaca4723c49780e5da63b529c6867b1a6200e386279b5ef8ca9a8d1 |
x86_64 | |
telnet-0.17-41.el5.x86_64.rpm | SHA-256: 6e5a0623ff69f0b45aa687d33d0d3d645000c5d6884b3994e4cf6a57320473e1 |
telnet-debuginfo-0.17-41.el5.x86_64.rpm | SHA-256: 1eb1532a61a109dba6a34a06ad654a32fd494c0e423c67a601ffc77aeb2ac790 |
telnet-server-0.17-41.el5.x86_64.rpm | SHA-256: 5609beaedcd20310918540dad8b9530e7635439267f1bdc15fc967024f171285 |
i386 | |
telnet-0.17-41.el5.i386.rpm | SHA-256: de6c541780b9c963f737f5c8d5ab70e360df20c4696cee8b63f8963e4c53f030 |
telnet-debuginfo-0.17-41.el5.i386.rpm | SHA-256: e19946883a0ba44863244c4c9ea3668cd168236aa1b5aaba84399d5ef21e86f4 |
telnet-server-0.17-41.el5.i386.rpm | SHA-256: 4ecdc079c375f7bec1c7bf88b692821f0e83fc98769d01fa39b7f7c99644281c |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
telnet-0.17-41.el5.src.rpm | SHA-256: e5666f6eaeaca4723c49780e5da63b529c6867b1a6200e386279b5ef8ca9a8d1 |
s390x | |
telnet-0.17-41.el5.s390x.rpm | SHA-256: cf27a0de4376f01c5a21e4fb2d93bad942d48e697d460758b155d82818694115 |
telnet-debuginfo-0.17-41.el5.s390x.rpm | SHA-256: b41b59f2ecef7ef2fd369bb018be6c03debf81fde08a835b4877202f6ff58917 |
telnet-server-0.17-41.el5.s390x.rpm | SHA-256: 05f0370f1f74d4fb65bf3a0ee1c3dc495021bcc0eb10ebe023d6f83f4fbfa3d2 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
telnet-0.17-41.el5.src.rpm | SHA-256: e5666f6eaeaca4723c49780e5da63b529c6867b1a6200e386279b5ef8ca9a8d1 |
ppc | |
telnet-0.17-41.el5.ppc.rpm | SHA-256: 8710405027241fb0c6f8e4e243df3d9cbb1b570af1ac66d16fbeb06cf8178c6f |
telnet-debuginfo-0.17-41.el5.ppc.rpm | SHA-256: 8d574640abe5b64f9d1e68fd3d1f15bc6588ccb658b02d276651bfae4b326763 |
telnet-server-0.17-41.el5.ppc.rpm | SHA-256: 5010a610be89f092bce596fbb16438c688292e34a7318ac1c675766de9a4de40 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
telnet-0.17-41.el5.src.rpm | SHA-256: e5666f6eaeaca4723c49780e5da63b529c6867b1a6200e386279b5ef8ca9a8d1 |
x86_64 | |
telnet-0.17-41.el5.x86_64.rpm | SHA-256: 6e5a0623ff69f0b45aa687d33d0d3d645000c5d6884b3994e4cf6a57320473e1 |
telnet-debuginfo-0.17-41.el5.x86_64.rpm | SHA-256: 1eb1532a61a109dba6a34a06ad654a32fd494c0e423c67a601ffc77aeb2ac790 |
telnet-server-0.17-41.el5.x86_64.rpm | SHA-256: 5609beaedcd20310918540dad8b9530e7635439267f1bdc15fc967024f171285 |
i386 | |
telnet-0.17-41.el5.i386.rpm | SHA-256: de6c541780b9c963f737f5c8d5ab70e360df20c4696cee8b63f8963e4c53f030 |
telnet-debuginfo-0.17-41.el5.i386.rpm | SHA-256: e19946883a0ba44863244c4c9ea3668cd168236aa1b5aaba84399d5ef21e86f4 |
telnet-server-0.17-41.el5.i386.rpm | SHA-256: 4ecdc079c375f7bec1c7bf88b692821f0e83fc98769d01fa39b7f7c99644281c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.