Skip to navigation

Bug Fix Advisory nss_ldap bug fix update

Advisory: RHBA-2008:0611-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-07-28
Last updated on: 2008-07-28
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.2.z server)

Details

An updated nss_ldap package that fixes a bug is now available.

The nss_ldap package contains the nss_ldap and pam_ldap modules. The
nss_ldap module allows applications to use a directory server as a primary
source for information about users and groups.

By default, the nss_ldap module keeps connections to a server open between
uses. In order to avoid problems that would occur if two client processes
attempted to issue queries over the same connection to a server, the module
installs a fork handler to allow it to close the client-side of any open
connection for a newly-created child process. This method frequently
caused a SIGPIPE signal to be received by the child process, which in many
cases, caused the child process to exit.

This issue may have caused commands, such as "su" to fail, broken pipe
errors, cron jobs not running, scripts not running as expected, and remote
session hangs.

Users of nss_ldap are advised to upgrade to this updated package, which
resolves this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nss_ldap-253-13.el5_2.1.src.rpm
File outdated by:  RHBA-2013:0251
    MD5: 7660704b8466cca7f2572063fee61585
 
IA-32:
nss_ldap-253-13.el5_2.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 388e73c72a2a8ef259b24e49dc1b24d3
 
IA-64:
nss_ldap-253-13.el5_2.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 388e73c72a2a8ef259b24e49dc1b24d3
nss_ldap-253-13.el5_2.1.ia64.rpm
File outdated by:  RHBA-2013:0251
    MD5: efe9119880140af39c21704f435f7cd3
 
PPC:
nss_ldap-253-13.el5_2.1.ppc.rpm
File outdated by:  RHBA-2013:0251
    MD5: 082a408d3d1908bbdf0fabbd16e1aaa2
nss_ldap-253-13.el5_2.1.ppc64.rpm
File outdated by:  RHBA-2013:0251
    MD5: 14c8bb4ce71355d64b2e67b834877201
 
s390x:
nss_ldap-253-13.el5_2.1.s390.rpm
File outdated by:  RHBA-2013:0251
    MD5: af712a1445ed71fe3d599c8052e2b78f
nss_ldap-253-13.el5_2.1.s390x.rpm
File outdated by:  RHBA-2013:0251
    MD5: ad9ee3a57e83035a9d15489a9b334984
 
x86_64:
nss_ldap-253-13.el5_2.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 388e73c72a2a8ef259b24e49dc1b24d3
nss_ldap-253-13.el5_2.1.x86_64.rpm
File outdated by:  RHBA-2013:0251
    MD5: dea95c2152e29aa9a932c6b07ae73c53
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
nss_ldap-253-13.el5_2.1.src.rpm
File outdated by:  RHBA-2013:0251
    MD5: 7660704b8466cca7f2572063fee61585
 
IA-32:
nss_ldap-253-13.el5_2.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 388e73c72a2a8ef259b24e49dc1b24d3
 
x86_64:
nss_ldap-253-13.el5_2.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 388e73c72a2a8ef259b24e49dc1b24d3
nss_ldap-253-13.el5_2.1.x86_64.rpm
File outdated by:  RHBA-2013:0251
    MD5: dea95c2152e29aa9a932c6b07ae73c53
 
Red Hat Enterprise Linux EUS (v. 5.2.z server)

SRPMS:
nss_ldap-253-13.el5_2.1.src.rpm
File outdated by:  RHBA-2013:0251
    MD5: 7660704b8466cca7f2572063fee61585
 
IA-32:
nss_ldap-253-13.el5_2.1.i386.rpm     MD5: 388e73c72a2a8ef259b24e49dc1b24d3
 
IA-64:
nss_ldap-253-13.el5_2.1.i386.rpm     MD5: 388e73c72a2a8ef259b24e49dc1b24d3
nss_ldap-253-13.el5_2.1.ia64.rpm     MD5: efe9119880140af39c21704f435f7cd3
 
PPC:
nss_ldap-253-13.el5_2.1.ppc.rpm     MD5: 082a408d3d1908bbdf0fabbd16e1aaa2
nss_ldap-253-13.el5_2.1.ppc64.rpm     MD5: 14c8bb4ce71355d64b2e67b834877201
 
s390x:
nss_ldap-253-13.el5_2.1.s390.rpm     MD5: af712a1445ed71fe3d599c8052e2b78f
nss_ldap-253-13.el5_2.1.s390x.rpm     MD5: ad9ee3a57e83035a9d15489a9b334984
 
x86_64:
nss_ldap-253-13.el5_2.1.i386.rpm     MD5: 388e73c72a2a8ef259b24e49dc1b24d3
nss_ldap-253-13.el5_2.1.x86_64.rpm     MD5: dea95c2152e29aa9a932c6b07ae73c53
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

455271 - bash command substitution broken with LDAP users


Keywords

sigpipe


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/