Skip to navigation

Bug Fix Advisory telnet bug fix update

Advisory: RHBA-2012:1312-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-09-26
Last updated on: 2012-09-26
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated telnet packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

Telnet is a popular protocol for logging in to remote systems over the Internet.
The telnet-server package includes a telnet service that supports remote logins
into the host machine. The telnet service is disabled by default.

This update fixes the following bug:

* Prior to this update, the telnetd daemon did not reuse previously created
entries in the /var/run/utmp file. Consequently, /var/run/utmp grew and
contained empty entries, eventually causing various other problems. With this
update, telnetd has been fixed to reuse entries in /var/run/utmp and behave like
other programs which use this file, thus preventing this bug. (BZ#860012)

All users of telnet are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
telnet-0.17-47.el6_3.1.src.rpm     MD5: a9aa5de3ef9f792b33994be4b9fd65a7
SHA-256: c75acdf5b96d38ad53a346f1a66a0cfb674845a381756a4124e342a0142ffac5
 
IA-32:
telnet-0.17-47.el6_3.1.i686.rpm     MD5: 86702208023c5cc388492d4f2c41042b
SHA-256: 6af9350a42784635d43c101f747efcf38e8eab6d5e64301adb72e64a6d738e27
telnet-debuginfo-0.17-47.el6_3.1.i686.rpm     MD5: 6b78cef8c69a642ea8b27438a3143ff0
SHA-256: f85b1b92d05af69abc0b8648718284acf15f98401f5a4dfae1f08db2905350cb
telnet-server-0.17-47.el6_3.1.i686.rpm     MD5: 529a624e6d6de9b051fbf338ffbb2f1a
SHA-256: 099676007411d0f93231fd3675190e733c34cf87779ada078cfe6d3c272b8b16
 
x86_64:
telnet-0.17-47.el6_3.1.x86_64.rpm     MD5: a3f9f02e964cfdb24f6ff665793d9dab
SHA-256: 4bbd3de4b83f2dea6e7b20471ce41a041f2587cc25ff7ca7f3e003ac596a41ec
telnet-debuginfo-0.17-47.el6_3.1.x86_64.rpm     MD5: 34cd44055df52255659df055bff70452
SHA-256: 83e29c1e28830ca3d522d9760dcad456f82f356e70428496004ab1a552a60b7e
telnet-server-0.17-47.el6_3.1.x86_64.rpm     MD5: cf23d5b711071646407549a94d43895d
SHA-256: 9749c802afdadc5db7780de2ad0accf939f322c7e675b090cd7011d03db64490
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
telnet-0.17-47.el6_3.1.src.rpm     MD5: a9aa5de3ef9f792b33994be4b9fd65a7
SHA-256: c75acdf5b96d38ad53a346f1a66a0cfb674845a381756a4124e342a0142ffac5
 
x86_64:
telnet-0.17-47.el6_3.1.x86_64.rpm     MD5: a3f9f02e964cfdb24f6ff665793d9dab
SHA-256: 4bbd3de4b83f2dea6e7b20471ce41a041f2587cc25ff7ca7f3e003ac596a41ec
telnet-debuginfo-0.17-47.el6_3.1.x86_64.rpm     MD5: 34cd44055df52255659df055bff70452
SHA-256: 83e29c1e28830ca3d522d9760dcad456f82f356e70428496004ab1a552a60b7e
telnet-server-0.17-47.el6_3.1.x86_64.rpm     MD5: cf23d5b711071646407549a94d43895d
SHA-256: 9749c802afdadc5db7780de2ad0accf939f322c7e675b090cd7011d03db64490
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
telnet-0.17-47.el6_3.1.src.rpm     MD5: a9aa5de3ef9f792b33994be4b9fd65a7
SHA-256: c75acdf5b96d38ad53a346f1a66a0cfb674845a381756a4124e342a0142ffac5
 
IA-32:
telnet-0.17-47.el6_3.1.i686.rpm     MD5: 86702208023c5cc388492d4f2c41042b
SHA-256: 6af9350a42784635d43c101f747efcf38e8eab6d5e64301adb72e64a6d738e27
telnet-debuginfo-0.17-47.el6_3.1.i686.rpm     MD5: 6b78cef8c69a642ea8b27438a3143ff0
SHA-256: f85b1b92d05af69abc0b8648718284acf15f98401f5a4dfae1f08db2905350cb
telnet-server-0.17-47.el6_3.1.i686.rpm     MD5: 529a624e6d6de9b051fbf338ffbb2f1a
SHA-256: 099676007411d0f93231fd3675190e733c34cf87779ada078cfe6d3c272b8b16
 
PPC:
telnet-0.17-47.el6_3.1.ppc64.rpm     MD5: 3a9fe17595ff11d3ddd8dcd35562e818
SHA-256: 28455ce6c21ed8860cfc78a012f2c8a23dfc41cc718ad18977ba9bf061e1a3c9
telnet-debuginfo-0.17-47.el6_3.1.ppc64.rpm     MD5: 279e104f9346695ab5e2b45b6e2c3928
SHA-256: 56a269a79d4201cd94d4bc12dfb3dab022afc304bac655ab8783a268aa12db7e
telnet-server-0.17-47.el6_3.1.ppc64.rpm     MD5: b2aa7a7bae46090e7209653aa3dc35a4
SHA-256: f7b03018f215597e5c19862a52e6753541fdde4517cc5281d3db81c49c9e82f8
 
s390x:
telnet-0.17-47.el6_3.1.s390x.rpm     MD5: 29c7e88e77a0b76339e35c80c9bb479d
SHA-256: aa46272a2b6df993484e3985bb1f520b86db17af86415a2267dfe30b104f9d4f
telnet-debuginfo-0.17-47.el6_3.1.s390x.rpm     MD5: 7b1c04ecca412392b978c86796259a8a
SHA-256: a8eb3d0f28f60aa3f1f440f74af1aed47b703ed87e6894da40b991477c7e1357
telnet-server-0.17-47.el6_3.1.s390x.rpm     MD5: 3a8bdc61972d057419008814f685865c
SHA-256: a2c82b1a6432132fdc82649ddb368c593d8d37778814f520bfacd41a6fc1f7f0
 
x86_64:
telnet-0.17-47.el6_3.1.x86_64.rpm     MD5: a3f9f02e964cfdb24f6ff665793d9dab
SHA-256: 4bbd3de4b83f2dea6e7b20471ce41a041f2587cc25ff7ca7f3e003ac596a41ec
telnet-debuginfo-0.17-47.el6_3.1.x86_64.rpm     MD5: 34cd44055df52255659df055bff70452
SHA-256: 83e29c1e28830ca3d522d9760dcad456f82f356e70428496004ab1a552a60b7e
telnet-server-0.17-47.el6_3.1.x86_64.rpm     MD5: cf23d5b711071646407549a94d43895d
SHA-256: 9749c802afdadc5db7780de2ad0accf939f322c7e675b090cd7011d03db64490
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
telnet-0.17-47.el6_3.1.src.rpm     MD5: a9aa5de3ef9f792b33994be4b9fd65a7
SHA-256: c75acdf5b96d38ad53a346f1a66a0cfb674845a381756a4124e342a0142ffac5
 
IA-32:
telnet-0.17-47.el6_3.1.i686.rpm     MD5: 86702208023c5cc388492d4f2c41042b
SHA-256: 6af9350a42784635d43c101f747efcf38e8eab6d5e64301adb72e64a6d738e27
telnet-debuginfo-0.17-47.el6_3.1.i686.rpm     MD5: 6b78cef8c69a642ea8b27438a3143ff0
SHA-256: f85b1b92d05af69abc0b8648718284acf15f98401f5a4dfae1f08db2905350cb
telnet-server-0.17-47.el6_3.1.i686.rpm     MD5: 529a624e6d6de9b051fbf338ffbb2f1a
SHA-256: 099676007411d0f93231fd3675190e733c34cf87779ada078cfe6d3c272b8b16
 
PPC:
telnet-0.17-47.el6_3.1.ppc64.rpm     MD5: 3a9fe17595ff11d3ddd8dcd35562e818
SHA-256: 28455ce6c21ed8860cfc78a012f2c8a23dfc41cc718ad18977ba9bf061e1a3c9
telnet-debuginfo-0.17-47.el6_3.1.ppc64.rpm     MD5: 279e104f9346695ab5e2b45b6e2c3928
SHA-256: 56a269a79d4201cd94d4bc12dfb3dab022afc304bac655ab8783a268aa12db7e
telnet-server-0.17-47.el6_3.1.ppc64.rpm     MD5: b2aa7a7bae46090e7209653aa3dc35a4
SHA-256: f7b03018f215597e5c19862a52e6753541fdde4517cc5281d3db81c49c9e82f8
 
s390x:
telnet-0.17-47.el6_3.1.s390x.rpm     MD5: 29c7e88e77a0b76339e35c80c9bb479d
SHA-256: aa46272a2b6df993484e3985bb1f520b86db17af86415a2267dfe30b104f9d4f
telnet-debuginfo-0.17-47.el6_3.1.s390x.rpm     MD5: 7b1c04ecca412392b978c86796259a8a
SHA-256: a8eb3d0f28f60aa3f1f440f74af1aed47b703ed87e6894da40b991477c7e1357
telnet-server-0.17-47.el6_3.1.s390x.rpm     MD5: 3a8bdc61972d057419008814f685865c
SHA-256: a2c82b1a6432132fdc82649ddb368c593d8d37778814f520bfacd41a6fc1f7f0
 
x86_64:
telnet-0.17-47.el6_3.1.x86_64.rpm     MD5: a3f9f02e964cfdb24f6ff665793d9dab
SHA-256: 4bbd3de4b83f2dea6e7b20471ce41a041f2587cc25ff7ca7f3e003ac596a41ec
telnet-debuginfo-0.17-47.el6_3.1.x86_64.rpm     MD5: 34cd44055df52255659df055bff70452
SHA-256: 83e29c1e28830ca3d522d9760dcad456f82f356e70428496004ab1a552a60b7e
telnet-server-0.17-47.el6_3.1.x86_64.rpm     MD5: cf23d5b711071646407549a94d43895d
SHA-256: 9749c802afdadc5db7780de2ad0accf939f322c7e675b090cd7011d03db64490
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
telnet-0.17-47.el6_3.1.src.rpm     MD5: a9aa5de3ef9f792b33994be4b9fd65a7
SHA-256: c75acdf5b96d38ad53a346f1a66a0cfb674845a381756a4124e342a0142ffac5
 
IA-32:
telnet-0.17-47.el6_3.1.i686.rpm     MD5: 86702208023c5cc388492d4f2c41042b
SHA-256: 6af9350a42784635d43c101f747efcf38e8eab6d5e64301adb72e64a6d738e27
telnet-debuginfo-0.17-47.el6_3.1.i686.rpm     MD5: 6b78cef8c69a642ea8b27438a3143ff0
SHA-256: f85b1b92d05af69abc0b8648718284acf15f98401f5a4dfae1f08db2905350cb
telnet-server-0.17-47.el6_3.1.i686.rpm     MD5: 529a624e6d6de9b051fbf338ffbb2f1a
SHA-256: 099676007411d0f93231fd3675190e733c34cf87779ada078cfe6d3c272b8b16
 
x86_64:
telnet-0.17-47.el6_3.1.x86_64.rpm     MD5: a3f9f02e964cfdb24f6ff665793d9dab
SHA-256: 4bbd3de4b83f2dea6e7b20471ce41a041f2587cc25ff7ca7f3e003ac596a41ec
telnet-debuginfo-0.17-47.el6_3.1.x86_64.rpm     MD5: 34cd44055df52255659df055bff70452
SHA-256: 83e29c1e28830ca3d522d9760dcad456f82f356e70428496004ab1a552a60b7e
telnet-server-0.17-47.el6_3.1.x86_64.rpm     MD5: cf23d5b711071646407549a94d43895d
SHA-256: 9749c802afdadc5db7780de2ad0accf939f322c7e675b090cd7011d03db64490
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

in.telnetd, telnet, utmp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/