- Issued:
- 2017-05-30
- Updated:
- 2017-05-30
RHBA-2017:1377 - Bug Fix Advisory
Synopsis
rsh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rsh packages that fix one bug are now available for Red Hat Enterprise Linux 6.
Description
The rsh packages contain programs which allow users to run commands on remote machines (the rsh utility), log on to other machines (the rlogin
utility), copy files between machines (the rcp utility), and programs which provide an alternate method of executing remote commands (the rexec utility). All of these programs are run by the xinetd service and can be configured using the Pluggable Authentication Modules (PAM) system and configuration files in the /etc/xinetd.d/ directory.
This update fixes the following bug:
- Previously, using the rlogin utility to log to a remote machine, the connection was closed on the remote side most of the time. This was caused by the forkpty() function which combines the openpty(), fork(), and login_tty() functions. When the child process handling the connection executed /bin/login, all open file descriptors got closed. This bug has been fixed, and now openpty(), fork(), and login_tty() are used separately instead of forkpty(). As a result, if needed, the parent process keeps the file descriptor of the child process open. (BZ#1450821)
Users of rsh are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 1450821 - rlogin fails to connect rsh-server after updating util-linux-ng from version 2.17.2-12.18.el6 to 2.17.2-12.24.el6
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
x86_64 | |
rsh-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 478a1f6a5a1a1b5085f038098f6a45c315a7bc412e0ae87f2cb8ec0f049e1b1c |
rsh-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 478a1f6a5a1a1b5085f038098f6a45c315a7bc412e0ae87f2cb8ec0f049e1b1c |
rsh-debuginfo-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 7fcd0ec9a87dc67005e6ae5fd89ac623ab41b511ea1eb4de76f6fcab811986d7 |
rsh-debuginfo-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 7fcd0ec9a87dc67005e6ae5fd89ac623ab41b511ea1eb4de76f6fcab811986d7 |
rsh-server-0.17-64.el6_9.1.x86_64.rpm | SHA-256: fcf9110a11feb1a01e854deb15e6b7ab1c88e4828571e43ef4b9638909442292 |
rsh-server-0.17-64.el6_9.1.x86_64.rpm | SHA-256: fcf9110a11feb1a01e854deb15e6b7ab1c88e4828571e43ef4b9638909442292 |
i386 | |
rsh-0.17-64.el6_9.1.i686.rpm | SHA-256: 798a680aee14857e85cf2b3a2ea712058a7d7c23ed555195cc0d4f8b72228c61 |
rsh-debuginfo-0.17-64.el6_9.1.i686.rpm | SHA-256: b74c5120850e64ecb67449b051a6325140c5459d83170bf617f683a6f4d04a24 |
rsh-server-0.17-64.el6_9.1.i686.rpm | SHA-256: 415ad51c1fc6cb3d006ae2a9e88accc9d5159a00ecdebe3c5f953b9a6615639b |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
x86_64 | |
rsh-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 478a1f6a5a1a1b5085f038098f6a45c315a7bc412e0ae87f2cb8ec0f049e1b1c |
rsh-debuginfo-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 7fcd0ec9a87dc67005e6ae5fd89ac623ab41b511ea1eb4de76f6fcab811986d7 |
rsh-server-0.17-64.el6_9.1.x86_64.rpm | SHA-256: fcf9110a11feb1a01e854deb15e6b7ab1c88e4828571e43ef4b9638909442292 |
i386 | |
rsh-0.17-64.el6_9.1.i686.rpm | SHA-256: 798a680aee14857e85cf2b3a2ea712058a7d7c23ed555195cc0d4f8b72228c61 |
rsh-debuginfo-0.17-64.el6_9.1.i686.rpm | SHA-256: b74c5120850e64ecb67449b051a6325140c5459d83170bf617f683a6f4d04a24 |
rsh-server-0.17-64.el6_9.1.i686.rpm | SHA-256: 415ad51c1fc6cb3d006ae2a9e88accc9d5159a00ecdebe3c5f953b9a6615639b |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
x86_64 | |
rsh-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 478a1f6a5a1a1b5085f038098f6a45c315a7bc412e0ae87f2cb8ec0f049e1b1c |
rsh-debuginfo-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 7fcd0ec9a87dc67005e6ae5fd89ac623ab41b511ea1eb4de76f6fcab811986d7 |
rsh-server-0.17-64.el6_9.1.x86_64.rpm | SHA-256: fcf9110a11feb1a01e854deb15e6b7ab1c88e4828571e43ef4b9638909442292 |
i386 | |
rsh-0.17-64.el6_9.1.i686.rpm | SHA-256: 798a680aee14857e85cf2b3a2ea712058a7d7c23ed555195cc0d4f8b72228c61 |
rsh-debuginfo-0.17-64.el6_9.1.i686.rpm | SHA-256: b74c5120850e64ecb67449b051a6325140c5459d83170bf617f683a6f4d04a24 |
rsh-server-0.17-64.el6_9.1.i686.rpm | SHA-256: 415ad51c1fc6cb3d006ae2a9e88accc9d5159a00ecdebe3c5f953b9a6615639b |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
x86_64 | |
rsh-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 478a1f6a5a1a1b5085f038098f6a45c315a7bc412e0ae87f2cb8ec0f049e1b1c |
rsh-debuginfo-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 7fcd0ec9a87dc67005e6ae5fd89ac623ab41b511ea1eb4de76f6fcab811986d7 |
rsh-server-0.17-64.el6_9.1.x86_64.rpm | SHA-256: fcf9110a11feb1a01e854deb15e6b7ab1c88e4828571e43ef4b9638909442292 |
i386 | |
rsh-0.17-64.el6_9.1.i686.rpm | SHA-256: 798a680aee14857e85cf2b3a2ea712058a7d7c23ed555195cc0d4f8b72228c61 |
rsh-debuginfo-0.17-64.el6_9.1.i686.rpm | SHA-256: b74c5120850e64ecb67449b051a6325140c5459d83170bf617f683a6f4d04a24 |
rsh-server-0.17-64.el6_9.1.i686.rpm | SHA-256: 415ad51c1fc6cb3d006ae2a9e88accc9d5159a00ecdebe3c5f953b9a6615639b |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
s390x | |
rsh-0.17-64.el6_9.1.s390x.rpm | SHA-256: 44065ee56473a9b4321c6f39bcf91ac609c383c1359db8e410a8a82585b892eb |
rsh-debuginfo-0.17-64.el6_9.1.s390x.rpm | SHA-256: 1d034a6a0628ecab06a033aed06ed92eac1e5d1b6de512dd60501d7a25b4509c |
rsh-server-0.17-64.el6_9.1.s390x.rpm | SHA-256: 9dc5f47144f9331efe2428911f57728aea4bf5a4b08733d5cb93a11fd8b7090b |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
ppc64 | |
rsh-0.17-64.el6_9.1.ppc64.rpm | SHA-256: 6f50233c6b1cb08eb5b8f5327c927cc4583afbc4cbac11d1d18d12e1b60f8ed1 |
rsh-debuginfo-0.17-64.el6_9.1.ppc64.rpm | SHA-256: 7c7444405ba8b70b5971b02f6c93dec67e408360040449419615789e138fd91a |
rsh-server-0.17-64.el6_9.1.ppc64.rpm | SHA-256: f2868876f23c84b13ce5a93fd9eef37ae07039fd2ebca752a6a00394a68b1867 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
x86_64 | |
rsh-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 478a1f6a5a1a1b5085f038098f6a45c315a7bc412e0ae87f2cb8ec0f049e1b1c |
rsh-debuginfo-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 7fcd0ec9a87dc67005e6ae5fd89ac623ab41b511ea1eb4de76f6fcab811986d7 |
rsh-server-0.17-64.el6_9.1.x86_64.rpm | SHA-256: fcf9110a11feb1a01e854deb15e6b7ab1c88e4828571e43ef4b9638909442292 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
s390x | |
rsh-0.17-64.el6_9.1.s390x.rpm | SHA-256: 44065ee56473a9b4321c6f39bcf91ac609c383c1359db8e410a8a82585b892eb |
rsh-debuginfo-0.17-64.el6_9.1.s390x.rpm | SHA-256: 1d034a6a0628ecab06a033aed06ed92eac1e5d1b6de512dd60501d7a25b4509c |
rsh-server-0.17-64.el6_9.1.s390x.rpm | SHA-256: 9dc5f47144f9331efe2428911f57728aea4bf5a4b08733d5cb93a11fd8b7090b |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
x86_64 | |
rsh-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 478a1f6a5a1a1b5085f038098f6a45c315a7bc412e0ae87f2cb8ec0f049e1b1c |
rsh-debuginfo-0.17-64.el6_9.1.x86_64.rpm | SHA-256: 7fcd0ec9a87dc67005e6ae5fd89ac623ab41b511ea1eb4de76f6fcab811986d7 |
rsh-server-0.17-64.el6_9.1.x86_64.rpm | SHA-256: fcf9110a11feb1a01e854deb15e6b7ab1c88e4828571e43ef4b9638909442292 |
i386 | |
rsh-0.17-64.el6_9.1.i686.rpm | SHA-256: 798a680aee14857e85cf2b3a2ea712058a7d7c23ed555195cc0d4f8b72228c61 |
rsh-debuginfo-0.17-64.el6_9.1.i686.rpm | SHA-256: b74c5120850e64ecb67449b051a6325140c5459d83170bf617f683a6f4d04a24 |
rsh-server-0.17-64.el6_9.1.i686.rpm | SHA-256: 415ad51c1fc6cb3d006ae2a9e88accc9d5159a00ecdebe3c5f953b9a6615639b |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
rsh-0.17-64.el6_9.1.src.rpm | SHA-256: 350c8cbc00a2460432f0b44575bfd81a3f0f67ddbdd8d7c849bb95176d0f5dfb |
s390x | |
rsh-0.17-64.el6_9.1.s390x.rpm | SHA-256: 44065ee56473a9b4321c6f39bcf91ac609c383c1359db8e410a8a82585b892eb |
rsh-debuginfo-0.17-64.el6_9.1.s390x.rpm | SHA-256: 1d034a6a0628ecab06a033aed06ed92eac1e5d1b6de512dd60501d7a25b4509c |
rsh-server-0.17-64.el6_9.1.s390x.rpm | SHA-256: 9dc5f47144f9331efe2428911f57728aea4bf5a4b08733d5cb93a11fd8b7090b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.