Skip to navigation

Bug Fix Advisory Updated shadow-utils package available

Advisory: RHBA-2004:212-06
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2004-05-11
Last updated on: 2004-05-11
Affected Products: Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)

Details

An updated shadow-utils package that addresses several bugs and implements several
enhancements is now available.

The shadow-utils package includes the necessary programs for converting UNIX password files
to the shadow password format, including programs for managing user and group accounts. The
pwconv command converts passwords to the shadow password format. The pwunconv command
unconverts shadow passwords and generates an npasswd file (a standard UNIX password file).
The pwck command checks the integrity of password and shadow files. The lastlog command
prints out the last login times for all users. The useradd, userdel, and usermod commands are
used for managing user accounts. The groupadd, groupdel, and groupmod commands
are used for managing group accounts.

The shadow-utils package has been updated so that the /etc/default/nss file is readable for
normal users, by changing the restrictive permissions on /etc/default which disallowed its
access.

Users of Red Hat Enterprise Linux 3 should upgrade to this updated package.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate
Errors, you need to install a version of the up2date client with an updated
certificate. The latest version of up2date is available from the Red Hat
FTP site and may also be downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Enterprise Linux AS (v. 3)

SRPMS:
shadow-utils-4.0.3-20.src.rpm
File outdated by:  RHSA-2007:0431
    MD5: 175fc06073090e52783de68829bd4903
shadow-utils-4.0.3-20.src.rpm
File outdated by:  RHSA-2007:0431
    MD5: e52e722627e94d48caea2f2de896eae7
 
IA-32:
shadow-utils-4.0.3-20.i386.rpm
File outdated by:  RHSA-2007:0431
    MD5: c4bc5ece8c4f7f13bb9915e23f072cb6
 
IA-64:
shadow-utils-4.0.3-20.ia64.rpm
File outdated by:  RHSA-2007:0431
    MD5: 7f79e97cae02fb5c0967444d9fb34467
 
PPC:
shadow-utils-4.0.3-20.ppc.rpm
File outdated by:  RHSA-2007:0431
    MD5: 02cb2b22b83416e9f65e90f131da6859
 
s390:
shadow-utils-4.0.3-20.s390.rpm
File outdated by:  RHSA-2007:0431
    MD5: 11902bae5af44ccf6b5f3a9b0189213d
 
s390x:
shadow-utils-4.0.3-20.s390x.rpm
File outdated by:  RHSA-2007:0431
    MD5: 3d9cc5f14de25382ef694ee5f70b2633
 
x86_64:
shadow-utils-4.0.3-20.x86_64.rpm
File outdated by:  RHSA-2007:0431
    MD5: 7075486dc65b6a3a0dafcaaf6a795c95
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
shadow-utils-4.0.3-20.src.rpm
File outdated by:  RHSA-2007:0431
    MD5: 175fc06073090e52783de68829bd4903
shadow-utils-4.0.3-20.src.rpm
File outdated by:  RHSA-2007:0431
    MD5: e52e722627e94d48caea2f2de896eae7
 
IA-32:
shadow-utils-4.0.3-20.i386.rpm
File outdated by:  RHSA-2007:0431
    MD5: c4bc5ece8c4f7f13bb9915e23f072cb6
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
shadow-utils-4.0.3-20.src.rpm
File outdated by:  RHSA-2007:0431
    MD5: 175fc06073090e52783de68829bd4903
shadow-utils-4.0.3-20.src.rpm
File outdated by:  RHSA-2007:0431
    MD5: e52e722627e94d48caea2f2de896eae7
 
IA-32:
shadow-utils-4.0.3-20.i386.rpm
File outdated by:  RHSA-2007:0431
    MD5: c4bc5ece8c4f7f13bb9915e23f072cb6
 
IA-64:
shadow-utils-4.0.3-20.ia64.rpm
File outdated by:  RHSA-2007:0431
    MD5: 7f79e97cae02fb5c0967444d9fb34467
 
x86_64:
shadow-utils-4.0.3-20.x86_64.rpm
File outdated by:  RHSA-2007:0431
    MD5: 7075486dc65b6a3a0dafcaaf6a795c95
 

Bugs fixed (see bugzilla for more information)

103576 - RHEL 2.1 U4: Modify behavior of getservbyname() to be more efficient when no protocol is specified and service name is being pulled from NIS.
109606 - sed crashes on garbage multibyte sequence
109790 - broken pthread_exit() in NPTL static
110252 - glibc should BuildRequire: texinfo
110401 - regex library mem leaks
112208 - memory leak when creating threads with user defined stacksize
112512 - pthread_setcancelstate does not work
112602 - Strange pthread_testcancel exception behavior
112726 - pmap_set leaks file descriptors on failure
112869 - grep -iE segfaults using \W unless LANG=C
115349 - mutex hang when using pthread_cond_broadcast() under high contention
116526 - Memory leak in getaddrinfo().
116606 - mbtowc() doesn't like large SIZE parameter values
118338 - RHEL 3 U2: NETID_AUTHORITATIVE functionality in glibc


Keywords

glibc, NPTL, regex


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/