Subject: [RHBA-2000:081-05] Update Agent's rhnsd daemon leaks file descriptors From: bugzilla@redhat.com Date: Mon, 9 Oct 2000 16:27 -0400 To: redhat-watch-list@redhat.com --------------------------------------------------------------------- Red Hat, Inc. Bug Fix Advisory Synopsis: Update Agent's rhnsd daemon leaks file descriptors Advisory ID: RHBA-2000:081-05 Issue date: 2000-10-06 Updated on: 2000-10-09 Product: Red Hat Linux Keywords: rhnsd up2date leak file descriptors Cross references: N/A --------------------------------------------------------------------- 1. Topic: The new Update Agent provided with Red Hat Linux 7.0 contains a daemon to connect to Red Hat Network. This program leaks file descriptors, causing all descriptors to be used up after approximately three weeks time. 2. Relevant releases/architectures: Red Hat Linux 7.0 - i386 Red Hat Linux 7.0J - i386 3. Problem description: The new Update Agent provided with Red Hat Linux 7.0 contains a daemon, rhnsd, which periodically polls Red Hat Network for updates. This daemon leaks file descriptors. On a default installation, all available file descriptors will be used by rhnsd in approximately three weeks, making the system unusable. 4. Solution: If you do not use Red Hat Network and do not want your machine to automatically poll for updates, you can turn off the rhnsd daemon using the following commands (while logged in as root): /sbin/service rhnsd stop /sinb/chkconfig --level 345 rhnsd off If you have subscribed your machine on the Red Hat Network, you will need to update the up2date packages listed in this errata advisory. You can use the Red Hat Update Agent to upgrade your machine by executing it from a command shell: up2date If you want to download the new packages and manually upgrade your system, run the following command for each RPM for your particular architecture: rpm -Fvh [filename] where [filename] is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 15365 - Swedish up2date .desktop file translation 17931 - unclear $INTERVAL comment in rhsnd init script 17933 - Bogus syslog messages from rhn_check 17934 - rhnsd should not run by default 18345 - rhnds leaking file descriptors 18543 - --anonymous command line options don't work 6. RPMs required: Red Hat Linux 7.0: i386: ftp://updates.redhat.com/7.0/i386/up2date-2.0.6-1.i386.rpm ftp://updates.redhat.com/7.0/i386/up2date-gnome-2.0.6-1.i386.rpm sources: ftp://updates.redhat.com/7.0/SRPMS/up2date-2.0.6-1.src.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- b8303934911a01264827cf31843f4b6b 7.0/SRPMS/up2date-2.0.6-1.src.rpm 3ad4e98a1ed5ba2974c195387dad8236 7.0/i386/up2date-2.0.6-1.i386.rpm 695c50d2101e6106d05cb6c99e12e187 7.0/i386/up2date-gnome-2.0.6-1.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A Copyright(c) 2000 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list