dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Red Hat Bug Fix Advisory: Update Agent's rhnsd daemon leaks file descriptors

Oct 10, 2000, 08:26 (1 Talkback[s])

WEBINAR:
On-Demand

Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers


Date: Mon, 9 Oct 2000 16:27 -0400
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHBA-2000:081-05] Update Agent's rhnsd daemon leaks file descriptors

 

                   Red Hat, Inc. Bug Fix Advisory
 
Synopsis:          Update Agent's rhnsd daemon leaks file descriptors
Advisory ID:       RHBA-2000:081-05
Issue date:        2000-10-06
Updated on:        2000-10-09
Product:           Red Hat Linux
Keywords:          rhnsd up2date leak file descriptors
Cross references:  N/A

1. Topic:

The new Update Agent provided with Red Hat Linux 7.0 contains a daemon to connect to Red Hat Network. This program leaks file descriptors, causing all descriptors to be used up after approximately three weeks time.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - i386
Red Hat Linux 7.0J - i386

3. Problem description:

The new Update Agent provided with Red Hat Linux 7.0 contains a daemon, rhnsd, which periodically polls Red Hat Network for updates. This daemon leaks file descriptors. On a default installation, all available file descriptors will be used by rhnsd in approximately three weeks, making the system unusable.

4. Solution:

If you do not use Red Hat Network and do not want your machine to automatically poll for updates, you can turn off the rhnsd daemon using the following commands (while logged in as root):

/sbin/service rhnsd stop
/sinb/chkconfig --level 345 rhnsd off

If you have subscribed your machine on the Red Hat Network, you will need to update the up2date packages listed in this errata advisory. You can use the Red Hat Update Agent to upgrade your machine by executing it from a command shell:

up2date

If you want to download the new packages and manually upgrade your system, run the following command for each RPM for your particular architecture:

rpm -Fvh [filename]

where [filename] is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

15365 - Swedish up2date .desktop file translation
17931 - unclear $INTERVAL comment in rhsnd init script
17933 - Bogus syslog messages from rhn_check
17934 - rhnsd should not run by default
18345 - rhnds leaking file descriptors
18543 - --anonymous command line options don't work

6. RPMs required:

Red Hat Linux 7.0:

i386:
ftp://updates.redhat.com/7.0/i386/up2date-2.0.6-1.i386.rpm
ftp://updates.redhat.com/7.0/i386/up2date-gnome-2.0.6-1.i386.rpm sources:
ftp://updates.redhat.com/7.0/SRPMS/up2date-2.0.6-1.src.rpm

7. Verification:

 
MD5 sum                           Package Name

b8303934911a01264827cf31843f4b6b  7.0/SRPMS/up2date-2.0.6-1.src.rpm
3ad4e98a1ed5ba2974c195387dad8236  7.0/i386/up2date-2.0.6-1.i386.rpm
695c50d2101e6106d05cb6c99e12e187  7.0/i386/up2date-gnome-2.0.6-1.i386.rpm
 
These packages are GPG signed by Red Hat, Inc. for security. Our key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:

N/A

Copyright(c) 2000 Red Hat, Inc.