Bug 671145
Summary: | /etc/profile.d/cvs.csh uses non-tcsh syntax | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Petr Pisar <ppisar> | ||||
Component: | cvs | Assignee: | Petr Pisar <ppisar> | ||||
Status: | CLOSED ERRATA | QA Contact: | Tomas Dolezal <todoleza> | ||||
Severity: | high | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 6.0 | CC: | azelinka, mcermak, mpoole, ovasik, ppisar, todoleza, vinschen | ||||
Target Milestone: | rc | Keywords: | EasyFix, Patch | ||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | cvs-1.11.23-14.el6 | Doc Type: | Bug Fix | ||||
Doc Text: |
Cause
User having tcsh login shell connects to CVS remote
server.
Consequence
CVS client uses rsh instead of SSH to reach server
becuase CVS_RSH environment is not set. If the server
has disabled rsh, then the connection cannot be
established. If the rsh is enabled, then sensitive
data can leak because rsh is not encrypted.
Fix
/etc/profile.d/cvs.csh has been adjusted to use valid csh
syntax to set CVS_RSH environment variable properly at
log-in.
Result
The CVS client will use SSH transport by default even if
user's login shell is tcsh.
|
Story Points: | --- | ||||
Clone Of: | 671003 | Environment: | |||||
Last Closed: | 2012-09-21 14:03:29 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 836169 | ||||||
Attachments: |
|
Description
Petr Pisar
2011-01-20 15:18:13 UTC
Created attachment 474480 [details] /etc/profile.d/cvs.csh Please note the command must terminate with new line, otherwise the line is not interpreted by tcsh (see bug #671003 for more details). *** Bug 684785 has been marked as a duplicate of this bug. *** This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. If you would like it considered as an exception in the current release, please ask your support representative. This bug exhibits with current cvs-1.11.23-12.el6.x86_64 and tcsh-6.17-13.el6.x86_64. *** Bug 757090 has been marked as a duplicate of this bug. *** Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: Cause User having tcsh login shell connects to CVS remote server. Consequence CVS client uses rsh instead of SSH to reach server becuase CVS_RSH environment is not set. If the server has disabled rsh, then the connection cannot be established. If the rsh is enabled, then sensitive data can leak because rsh is not encrypted. Fix /etc/profile.d/cvs.csh has been adjusted to use valid csh syntax to set CVS_RSH environment variable properly at log-in. Result The CVS client will use SSH transport by default even if user's login shell is tcsh. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2012-1302.html |