Updated rsh packages that fix one bug are now available for Red Hat EnterpriseLinux 7.

The rsh packages contain programs which allow users to run commands on remotemachines (the rsh application), log on to other machines (the rloginapplication), copy files between machines (the rcp application), and programswhich provide an alternate method of executing remote commands (the rexecapplication). All of these programs are run by the xinetd service and can beconfigured using the Pluggable Authentication Modules (PAM) system andconfiguration files in the /etc/xinetd.d/ directory.This update fixes the following bug:* Previously, the rcp utility incorrectly determined the name of the targetdirectory if a recursive copy action was requested. As a consequence, thecreated directory name was missing the first character. This update patches thercp code so that the pointer returned by the rcp_basename() function is notadvanced forward, and the name of the created directory is now correct.(BZ#1209816)Users of rsh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
rsh-0.17-76.el7_1.1.src.rpm
    MD5: 4085933a71e529407a1231f9661423f3SHA-256: 009096daf725fc64da366ead915f6e6fe9f6d430a2682496dc2fc6b57169dc8c
 
x86_64:
rsh-0.17-76.el7_1.1.x86_64.rpm
    MD5: 57bba831eb2b6733712ab2eedd03f003SHA-256: cd5143b9a56eae716e9b3c53a9fa3e29667db59b040c54405c79dc87358f9d1a
rsh-debuginfo-0.17-76.el7_1.1.x86_64.rpm
    MD5: 49b1b62354bf4e62f65cf24d6b4f9f83SHA-256: 98522bf92cd8517056353991ad2addb47bb02dca13de3b9327d5b2ac53320ab5
rsh-server-0.17-76.el7_1.1.x86_64.rpm
    MD5: 8a5643c2f25251c2fcac766a46331237SHA-256: 35fd60c9f1e68563e0aff8d5d28a46d65c67d7d34a04c6154917d687eb7c8861
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
rsh-0.17-76.el7_1.1.src.rpm
    MD5: 4085933a71e529407a1231f9661423f3SHA-256: 009096daf725fc64da366ead915f6e6fe9f6d430a2682496dc2fc6b57169dc8c
 
x86_64:
rsh-0.17-76.el7_1.1.x86_64.rpm
    MD5: 57bba831eb2b6733712ab2eedd03f003SHA-256: cd5143b9a56eae716e9b3c53a9fa3e29667db59b040c54405c79dc87358f9d1a
rsh-debuginfo-0.17-76.el7_1.1.x86_64.rpm
    MD5: 49b1b62354bf4e62f65cf24d6b4f9f83SHA-256: 98522bf92cd8517056353991ad2addb47bb02dca13de3b9327d5b2ac53320ab5
rsh-server-0.17-76.el7_1.1.x86_64.rpm
    MD5: 8a5643c2f25251c2fcac766a46331237SHA-256: 35fd60c9f1e68563e0aff8d5d28a46d65c67d7d34a04c6154917d687eb7c8861
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
rsh-0.17-76.el7_1.1.src.rpm
    MD5: 4085933a71e529407a1231f9661423f3SHA-256: 009096daf725fc64da366ead915f6e6fe9f6d430a2682496dc2fc6b57169dc8c
 
PPC:
rsh-0.17-76.el7_1.1.ppc64.rpm
    MD5: fa93b4d63c0b94104ba856d2c744f4b3SHA-256: d07d304397db3f5776df4717eb80e72475da11025e6a8c46f2f946b11a85c6dd
rsh-debuginfo-0.17-76.el7_1.1.ppc64.rpm
    MD5: 16cd42ddd0fe948e7677f3b3c5a21164SHA-256: 7122143271e609eb7ea0b5f3b7dd302226115255e90baadcc6fa75eba8eef803
rsh-server-0.17-76.el7_1.1.ppc64.rpm
    MD5: 684f87ee47bb2430904b1dfe20970b87SHA-256: 9c686c0e0c9c4144e943033508b6643c86b336ec507f4113edb5d8aed1f445b5
 
s390x:
rsh-0.17-76.el7_1.1.s390x.rpm
    MD5: 7f75ae74978b8b32f2f21bde5c279f61SHA-256: 9c538788cb4aa54bc88b9e268af51f5b50e14231a6d64a2735f58f766543f84f
rsh-debuginfo-0.17-76.el7_1.1.s390x.rpm
    MD5: 093ee9bc31d91a00c987f672234b2e8cSHA-256: e9180222aec8061ec9bec18d48c7b2bcd7a2b64ba056773c077bfa0269bffd89
rsh-server-0.17-76.el7_1.1.s390x.rpm
    MD5: 42d0a83296eff1589ef2787ebcd75d0aSHA-256: 9dafb200ddb202d17fb580703fc1728aa7e50cb31a3824153dec022c6bff7492
 
x86_64:
rsh-0.17-76.el7_1.1.x86_64.rpm
    MD5: 57bba831eb2b6733712ab2eedd03f003SHA-256: cd5143b9a56eae716e9b3c53a9fa3e29667db59b040c54405c79dc87358f9d1a
rsh-debuginfo-0.17-76.el7_1.1.x86_64.rpm
    MD5: 49b1b62354bf4e62f65cf24d6b4f9f83SHA-256: 98522bf92cd8517056353991ad2addb47bb02dca13de3b9327d5b2ac53320ab5
rsh-server-0.17-76.el7_1.1.x86_64.rpm
    MD5: 8a5643c2f25251c2fcac766a46331237SHA-256: 35fd60c9f1e68563e0aff8d5d28a46d65c67d7d34a04c6154917d687eb7c8861
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
rsh-0.17-76.el7_1.1.src.rpm
    MD5: 4085933a71e529407a1231f9661423f3SHA-256: 009096daf725fc64da366ead915f6e6fe9f6d430a2682496dc2fc6b57169dc8c
 
x86_64:
rsh-0.17-76.el7_1.1.x86_64.rpm
    MD5: 57bba831eb2b6733712ab2eedd03f003SHA-256: cd5143b9a56eae716e9b3c53a9fa3e29667db59b040c54405c79dc87358f9d1a
rsh-debuginfo-0.17-76.el7_1.1.x86_64.rpm
    MD5: 49b1b62354bf4e62f65cf24d6b4f9f83SHA-256: 98522bf92cd8517056353991ad2addb47bb02dca13de3b9327d5b2ac53320ab5
rsh-server-0.17-76.el7_1.1.x86_64.rpm
    MD5: 8a5643c2f25251c2fcac766a46331237SHA-256: 35fd60c9f1e68563e0aff8d5d28a46d65c67d7d34a04c6154917d687eb7c8861
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply