- Issued:
- 2008-07-23
- Updated:
- 2008-07-23
RHBA-2008:0613 - Bug Fix Advisory
Synopsis
rdate bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated rdate package that fixes various bugs is now available.
Description
The rdate utility retrieves the date and time from another machine on your
network, using the time protocol (RFC 868). If you run rdate as root, it
sets your machine's local time to the time of the machine that you queried.
This updated package fixes the following bugs:
- rdate freed host address information before it used it. This may have
caused a segmentation fault, or invalid arguments being sent, resulting in
a "Could not connect to host [host] Invalid argument" error.
- rdate performed incorrect memory allocation, that may have caused UDP
connection failures. Such incorrect allocation could be seen by running the
"valgrind rdate -s [host]" command.
Users of rdate are advised to upgrade to this updated package, which
resolves this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 436517 - rdate frees address info before use.
- BZ - 455439 - wrong memory allocation in rdate
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
rdate-1.4-8.el5.src.rpm | SHA-256: c43ea07e0d92dff3272adc878cf87862c2148e21a0097ab210762fb576960077 |
x86_64 | |
rdate-1.4-8.el5.x86_64.rpm | SHA-256: 2c675ac096f7f4eed5baaa01d1340a21c0b87bac50dab361490e36eeec0e6405 |
ia64 | |
rdate-1.4-8.el5.ia64.rpm | SHA-256: 5912dcf7f42108c695681d2105cf2d80d075652a57a910d4aa87a681ebdfa416 |
i386 | |
rdate-1.4-8.el5.i386.rpm | SHA-256: 8385790cc279b591d9b77ef59023dbba6bea88d63025e04f5c3d47c0dc71a40e |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
rdate-1.4-8.el5.src.rpm | SHA-256: c43ea07e0d92dff3272adc878cf87862c2148e21a0097ab210762fb576960077 |
x86_64 | |
rdate-1.4-8.el5.x86_64.rpm | SHA-256: 2c675ac096f7f4eed5baaa01d1340a21c0b87bac50dab361490e36eeec0e6405 |
i386 | |
rdate-1.4-8.el5.i386.rpm | SHA-256: 8385790cc279b591d9b77ef59023dbba6bea88d63025e04f5c3d47c0dc71a40e |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
rdate-1.4-8.el5.src.rpm | SHA-256: c43ea07e0d92dff3272adc878cf87862c2148e21a0097ab210762fb576960077 |
s390x | |
rdate-1.4-8.el5.s390x.rpm | SHA-256: a070057a477ae6bbd80f45cf90149d8c47cac6c2611d8ae29c2ef9b169b1047d |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
rdate-1.4-8.el5.src.rpm | SHA-256: c43ea07e0d92dff3272adc878cf87862c2148e21a0097ab210762fb576960077 |
ppc | |
rdate-1.4-8.el5.ppc.rpm | SHA-256: 3f1e63eb031bac2dc230696dc836c8110eddcfd5589d204a096f37e0293c3be1 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
rdate-1.4-8.el5.src.rpm | SHA-256: c43ea07e0d92dff3272adc878cf87862c2148e21a0097ab210762fb576960077 |
x86_64 | |
rdate-1.4-8.el5.x86_64.rpm | SHA-256: 2c675ac096f7f4eed5baaa01d1340a21c0b87bac50dab361490e36eeec0e6405 |
i386 | |
rdate-1.4-8.el5.i386.rpm | SHA-256: 8385790cc279b591d9b77ef59023dbba6bea88d63025e04f5c3d47c0dc71a40e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.