Updated rsh packages that fix several bugs are now available for Red HatEnterprise Linux 6.

The rsh packages contain programs which allow users to run commands on remotemachines, log in to other machines, copy files between machines (rsh, rlogin andrcp), and provide an alternate method of executing remote commands (rexec). Allof these programs are run by the xinetd daemon and can be configured using thePluggable Authentication Modules (PAM) system and configuration files in the/etc/xinetd.d/ directory.This update fixes the following bugs:* Previously, the rshd daemon performed redundant calls of the setpwent() andendpwent() functions. As a consequence, rshd queried Network InformationSecurity (NIS) servers on every remote shell (rsh) access. With this update,these redundant calls have been removed and rshd no longer contacts NIS serversunnecessarily. (BZ#749283)* Prior to this update, the maximum number of command line arguments for the rshapplication was not limited. However, the volume of data buffer allocated to thearguments is always finite. Consequently, rshd terminated unexpectedly when itattempted to allocate the buffer to commands with a vast number of arguments.This update implements a limit for command-line arguments in rsh, and thedescribed rshd crash no longer occurs. (BZ#802367)* Previously, the pam_close_session() function was not called when a remote copy(rcp) connection completed. As a consequence, the PAM session did not terminatecorrectly. With this update, pam_close_session() is called and the PAM sessionterminates as intended. (BZ#1098955)* Prior to this update, the rsh application was optimized through strictaliasing rules, even though it is not a performance-sensitive application. As aconsequence, the GNU compiler collection (GCC) generated warning messages aboutbreaking the strict-aliasing rules, despite correct functionality being thepriority for rsh. With this update, strict aliasing has been disabled for rsh.Therefore, GCC now ignores the strict aliasing rules and no longer interruptsrsh processes with warning messages. However, this may also lead to a slightdecrease in performance. (BZ#1094360)Users of rsh are advised to upgrade to these updated packages, which fix thesebugs.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
rsh-0.17-64.el6.src.rpm
    MD5: 2e8f9b154f556509e7aa1b6ed717b024SHA-256: d6d9d5d36fc7fc171d2256846549e7ff8d55aeb66c9ea5a10b116dad891588ef
 
IA-32:
rsh-0.17-64.el6.i686.rpm
    MD5: 56892a6f75c8511b7a6da8760f09ec15SHA-256: 28bb1e40d353519e9b8ce89af00f00b91480774eb33b772c41031acd8e9dde21
rsh-debuginfo-0.17-64.el6.i686.rpm
    MD5: 585561e63a06e582bae97ee80a292677SHA-256: 44d4fe6f29b21cf6384e2c9c3c4d5a3c08ccb0ce4df780b28c9a59f73d0e2137
rsh-server-0.17-64.el6.i686.rpm
    MD5: 2f2f53614b64d150606a1635ae7c81d6SHA-256: 9d2c7f95551cdee14bae564879fe87fcae2a1a1becbc81fdf37e1d744e4098e2
 
x86_64:
rsh-0.17-64.el6.x86_64.rpm
    MD5: 4d69db0e2e676c2e5174c761a1dfb19fSHA-256: 2fb517cafc403d65683c8bbfd8fb2eeed95cd2f221514c79e39f0600615fe79a
rsh-debuginfo-0.17-64.el6.x86_64.rpm
    MD5: 947c1c668f4680c9ca044d3c182a275eSHA-256: 1c2ccda303b3356470123313c0dd3f38c0ba20514a02f12aa846320565c2c2f9
rsh-server-0.17-64.el6.x86_64.rpm
    MD5: 94dd664411a7633ba9a2511f076488f8SHA-256: 6c5044a9976a03500042a9d7998dbc63d6c6903a046fca65f90dd0f2d1c9f68a
 
Red Hat Enterprise Linux HPC Node FasTrack (v. 6)

SRPMS:
rsh-0.17-64.el6.src.rpm
    MD5: 2e8f9b154f556509e7aa1b6ed717b024SHA-256: d6d9d5d36fc7fc171d2256846549e7ff8d55aeb66c9ea5a10b116dad891588ef
 
x86_64:
rsh-0.17-64.el6.x86_64.rpm
    MD5: 4d69db0e2e676c2e5174c761a1dfb19fSHA-256: 2fb517cafc403d65683c8bbfd8fb2eeed95cd2f221514c79e39f0600615fe79a
rsh-debuginfo-0.17-64.el6.x86_64.rpm
    MD5: 947c1c668f4680c9ca044d3c182a275eSHA-256: 1c2ccda303b3356470123313c0dd3f38c0ba20514a02f12aa846320565c2c2f9
rsh-server-0.17-64.el6.x86_64.rpm
    MD5: 94dd664411a7633ba9a2511f076488f8SHA-256: 6c5044a9976a03500042a9d7998dbc63d6c6903a046fca65f90dd0f2d1c9f68a
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
rsh-0.17-64.el6.src.rpm
    MD5: 2e8f9b154f556509e7aa1b6ed717b024SHA-256: d6d9d5d36fc7fc171d2256846549e7ff8d55aeb66c9ea5a10b116dad891588ef
 
IA-32:
rsh-0.17-64.el6.i686.rpm
    MD5: 56892a6f75c8511b7a6da8760f09ec15SHA-256: 28bb1e40d353519e9b8ce89af00f00b91480774eb33b772c41031acd8e9dde21
rsh-debuginfo-0.17-64.el6.i686.rpm
    MD5: 585561e63a06e582bae97ee80a292677SHA-256: 44d4fe6f29b21cf6384e2c9c3c4d5a3c08ccb0ce4df780b28c9a59f73d0e2137
rsh-server-0.17-64.el6.i686.rpm
    MD5: 2f2f53614b64d150606a1635ae7c81d6SHA-256: 9d2c7f95551cdee14bae564879fe87fcae2a1a1becbc81fdf37e1d744e4098e2
 
PPC:
rsh-0.17-64.el6.ppc64.rpm
    MD5: a3b641ae3d466316fa8b7c36b5d923b3SHA-256: 4bd8f99f180851fcba498eb68be6ef2390bbdf9b066831360fb6839f2190024a
rsh-debuginfo-0.17-64.el6.ppc64.rpm
    MD5: 59d086d7c012ded2696ef6c1245b0849SHA-256: 1a53ddeaca9c620b9cfce81c6486d8fde119fd70c2cfa1f5fea2866a7858432d
rsh-server-0.17-64.el6.ppc64.rpm
    MD5: b035a160cb3609033c1c4516172d9bcaSHA-256: 0b141915b61b44a8dd0860244a9117648c3234a449601b115838de6bb0f91739
 
s390x:
rsh-0.17-64.el6.s390x.rpm
    MD5: 4e05de29f1c1406f57c456d5b1568b43SHA-256: 1b5870439315ba1a03a6704f97361ea2824a270ad7e6c1f2821a94cd3ffd9606
rsh-debuginfo-0.17-64.el6.s390x.rpm
    MD5: 2509c4f55f90ddc3125371c3b54e5fedSHA-256: 10c0e31597a023244770d4a1f26ff30db266a336d8ad173826b83777bbdab480
rsh-server-0.17-64.el6.s390x.rpm
    MD5: 8680bda0c1bec7bf2a2e0bba220da471SHA-256: 622e1c040474189a7a81cde591c7877c78402bc025eb71f880bcf99727e8ab80
 
x86_64:
rsh-0.17-64.el6.x86_64.rpm
    MD5: 4d69db0e2e676c2e5174c761a1dfb19fSHA-256: 2fb517cafc403d65683c8bbfd8fb2eeed95cd2f221514c79e39f0600615fe79a
rsh-debuginfo-0.17-64.el6.x86_64.rpm
    MD5: 947c1c668f4680c9ca044d3c182a275eSHA-256: 1c2ccda303b3356470123313c0dd3f38c0ba20514a02f12aa846320565c2c2f9
rsh-server-0.17-64.el6.x86_64.rpm
    MD5: 94dd664411a7633ba9a2511f076488f8SHA-256: 6c5044a9976a03500042a9d7998dbc63d6c6903a046fca65f90dd0f2d1c9f68a
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
rsh-0.17-64.el6.src.rpm
    MD5: 2e8f9b154f556509e7aa1b6ed717b024SHA-256: d6d9d5d36fc7fc171d2256846549e7ff8d55aeb66c9ea5a10b116dad891588ef
 
IA-32:
rsh-0.17-64.el6.i686.rpm
    MD5: 56892a6f75c8511b7a6da8760f09ec15SHA-256: 28bb1e40d353519e9b8ce89af00f00b91480774eb33b772c41031acd8e9dde21
rsh-debuginfo-0.17-64.el6.i686.rpm
    MD5: 585561e63a06e582bae97ee80a292677SHA-256: 44d4fe6f29b21cf6384e2c9c3c4d5a3c08ccb0ce4df780b28c9a59f73d0e2137
rsh-server-0.17-64.el6.i686.rpm
    MD5: 2f2f53614b64d150606a1635ae7c81d6SHA-256: 9d2c7f95551cdee14bae564879fe87fcae2a1a1becbc81fdf37e1d744e4098e2
 
x86_64:
rsh-0.17-64.el6.x86_64.rpm
    MD5: 4d69db0e2e676c2e5174c761a1dfb19fSHA-256: 2fb517cafc403d65683c8bbfd8fb2eeed95cd2f221514c79e39f0600615fe79a
rsh-debuginfo-0.17-64.el6.x86_64.rpm
    MD5: 947c1c668f4680c9ca044d3c182a275eSHA-256: 1c2ccda303b3356470123313c0dd3f38c0ba20514a02f12aa846320565c2c2f9
rsh-server-0.17-64.el6.x86_64.rpm
    MD5: 94dd664411a7633ba9a2511f076488f8SHA-256: 6c5044a9976a03500042a9d7998dbc63d6c6903a046fca65f90dd0f2d1c9f68a
 
(The unlinked packages above are only available from the Red Hat Network)
1094360 – Disable strict-aliasing optimization for rsh

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply