- Issued:
- 2013-06-19
- Updated:
- 2013-06-19
RHBA-2013:0960 - Bug Fix Advisory
Synopsis
Red Hat Directory Server bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Red Hat Directory Server and related packages that fix several bugs are
now available for Red Hat Directory Server 9.1.
Description
Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of
packages includes the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration, the Administration Server HTTP
agent package, and the GUI console packages.
This update fixes the following bugs:
- The htmladmin Common Gateway Interface (CGI) script contained a bug in
hostname handling. As a consequence, htmladmin terminated with a segmentation
fault if it was given an IPv4 address in dot-decimal notation. With this update,
htmladmin now handles IPv4 addresses in dot-decimal notation as expected, and no
longer crashes in the described scenario. (BZ#830350)
- Due to a bug in the restartsrv CGI script, the Red Hat Admin Server could not
be restarted from the Console (a Java-based management console), and restartsrv
terminated with a segmentation fault. This update fixes the script and the Admin
Server can now be restarted from the Console as expected. (BZ#887394)
- Although the remove-ds.pl script could be used with the "-a" option to remove
all the files and directories generated by the setup-ds.pl script, the
remove-ds-admin.pl script did not have the corresponding feature. Consequently,
the files and directories generated by the setup-ds-admin.pl script could not be
removed from the Admin Server automatically. This update introduces the "-a"
option to remove-ds-admin.pl so that it can be used same as remove-ds.pl and all
the generated files and directories now can be automatically removed from the
Admin Server. (BZ#889575)
- BIND operation results were not properly verified in the Admin Server and the
AdminUtil utilities. Consequently, users were unable to log into the Directory
Server using the Console when an anonymous access was disabled in the 389
Directory Server instance. This update modifies the underlying code so that BIND
operations are now correctly verified and logging via the Console works as
expected in this situation. (BZ#905266)
- There was a typo in the remove-ds-admin.pl script. Consequently, it was not
possible to call "service dirsrv-admin stop". Although the remove-ds-admin.pl
script removed the directory server and Admin server instance, it left the Admin
server process up. This update fixes the logic in the remove-ds-admin.pl script
so that it calls the "service dirsrv-admin stop" command when it removes the
server instances. As a result, the remove-ds-admin.pl script stops the Admin
server processes as expected in the described scenario. (BZ#928560)
Users of Red Hat Directory Server are advised to upgrade to these updated
packages, which fix these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Directory Server 9 x86_64
- Red Hat Directory Server 9 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Directory Server 9
SRPM | |
---|---|
389-admin-1.1.34-1.el6.src.rpm | SHA-256: 735c2f2c273b6ef153bb20139cb2f273dcac53c2b7cc3d1e22b550a08f6df540 |
389-adminutil-1.1.17-1.el6.src.rpm | SHA-256: 43f032caae5a3125826b25fb53aec1c969211675283e93b00802c81e7187be4a |
redhat-admin-console-9.1.0-1.el6.src.rpm | SHA-256: f9e5d121dbab1158be79ccb554ac83b44d07062f40a900cfca44021c81e1f47f |
redhat-ds-9.1.0-1.el6.src.rpm | SHA-256: 2aba9ac5f6cd57de678de7b99cb3ae96b798c824c93bd0c0957c08c1501152a0 |
redhat-ds-admin-9.1.0-1.el6.src.rpm | SHA-256: fa8c7e100d6905141a47853fa9e8221d2d41c6b5320477a26da432f7f4d82405 |
redhat-ds-base-9.1.0-1.el6dsrv.src.rpm | SHA-256: 54aa0c7ef9ae461f28ef175efe68a0052fb19fc83b5a52774ba4cd1fcd4cfda4 |
redhat-ds-console-9.1.0-1.el6.src.rpm | SHA-256: 5fe7d1a6458a14fbfafe0363a5ef9089de1a65179d28ac7b955672c3e430667f |
redhat-idm-console-9.1.0-1.el6.src.rpm | SHA-256: 2bb48e35b6e50ad37f87052ee3450cfc7d85c1b0722210ed735a7d9ba6388ff4 |
x86_64 | |
389-admin-1.1.34-1.el6.x86_64.rpm | SHA-256: b456497a09e95fab0c11a15ed246fc16ecc127f2526f314604d50b09953fd124 |
389-admin-debuginfo-1.1.34-1.el6.x86_64.rpm | SHA-256: 7340bdc13b6e54af962ba0689b003c34a838cd48d2eb7762fb06eca26a725fe4 |
389-adminutil-1.1.17-1.el6.x86_64.rpm | SHA-256: c99cf4259b19fbe6539896a23e20c13d053024241b74c757703a882c42ce9b10 |
389-adminutil-debuginfo-1.1.17-1.el6.x86_64.rpm | SHA-256: 888f30e3629df72a230f5f685d3d541d9b95a7e8146000191cafb915529968a9 |
389-adminutil-devel-1.1.17-1.el6.x86_64.rpm | SHA-256: 95d96bf5b89b7456eedbbf664230c25e9118b931dbff15d8d120724003a854b0 |
redhat-admin-console-9.1.0-1.el6.noarch.rpm | SHA-256: de878b137fd952307a482ec9884779331e3c03c7753ae59a911356666746946c |
redhat-admin-console-doc-9.1.0-1.el6.noarch.rpm | SHA-256: af54cac874a991b92e5b19e54aa2bc6077b12fab713f01c74dfe005d47ef5448 |
redhat-ds-9.1.0-1.el6.x86_64.rpm | SHA-256: a4c2eef79f23eccb98d1e7c3df3f787db265695ed32820aebf23500c3fe7b714 |
redhat-ds-admin-9.1.0-1.el6.x86_64.rpm | SHA-256: 1d7c1cc4a4344d89a58831fa92588d8317b48e8f70926acb609a63a567dffbae |
redhat-ds-admin-debuginfo-9.1.0-1.el6.x86_64.rpm | SHA-256: 56aeb619b39b3de2c3ea47abc8deaeaedf442415a40f85b8fbdf82a89e447039 |
redhat-ds-base-9.1.0-1.el6dsrv.x86_64.rpm | SHA-256: 02eae7cc980ee53c7d544561a1bd5a5eb57abcbd32a1e67d51bf4938af14ebde |
redhat-ds-base-debuginfo-9.1.0-1.el6dsrv.x86_64.rpm | SHA-256: 330a27e8477ed459890802ae459fa06d1020f4b3f9e5abafcefd7fc8b3519be6 |
redhat-ds-base-devel-9.1.0-1.el6dsrv.x86_64.rpm | SHA-256: 85e39e51f0349ab67cb616cfa0c985b7d282e969ffd58a6fade45f3f6a51a20b |
redhat-ds-console-9.1.0-1.el6.noarch.rpm | SHA-256: 4cbd649bdadf86531c6680e9b092233aaa07b2a1485692e6388306999cbbdd76 |
redhat-ds-console-doc-9.1.0-1.el6.noarch.rpm | SHA-256: c331d8c7c5ba7fe9b4e6a3468d06f467340799248b465bab7694bf2b003e1b50 |
redhat-idm-console-9.1.0-1.el6.x86_64.rpm | SHA-256: 90ddc7966da8a9de619b5792c5936a12c9d3de560a8bf21f544a7bc744981ce9 |
redhat-idm-console-debuginfo-9.1.0-1.el6.x86_64.rpm | SHA-256: 3acd7f6f0bb8ac75a02785e652d76a5ae2317c6bcfecfdbf1450b79bcae85394 |
i386 | |
389-admin-1.1.34-1.el6.i386.rpm | SHA-256: de0690851d3d023d38b48ac4b72eb15daa6f945442524b35047e1cf4df918afe |
389-admin-debuginfo-1.1.34-1.el6.i386.rpm | SHA-256: b79971cff5537c9ab2d7229e3f80cfa56425875aa37970e873b0707e39a20ec3 |
389-adminutil-1.1.17-1.el6.i386.rpm | SHA-256: f7a21fddc966ec4c1fff5718c79da075be5c2fa5b7f77df9c92b553dc3b36937 |
389-adminutil-debuginfo-1.1.17-1.el6.i386.rpm | SHA-256: 16cb3d4784730c4730b0cf8458950a4d4c6a50b8c2c6318aa104a3c6f0147ee3 |
389-adminutil-devel-1.1.17-1.el6.i386.rpm | SHA-256: 5d8024d6fbac0a615c1c00f6f5a5770de05cd6c20bcf2941f20c252d353795af |
redhat-admin-console-9.1.0-1.el6.noarch.rpm | SHA-256: de878b137fd952307a482ec9884779331e3c03c7753ae59a911356666746946c |
redhat-admin-console-doc-9.1.0-1.el6.noarch.rpm | SHA-256: af54cac874a991b92e5b19e54aa2bc6077b12fab713f01c74dfe005d47ef5448 |
redhat-ds-9.1.0-1.el6.i386.rpm | SHA-256: 32d3c4f653ada790811de560591c08971c8e17d41886c48433e955dd50d2ff6b |
redhat-ds-admin-9.1.0-1.el6.i386.rpm | SHA-256: 47e90440b3367d5c557904340a2ace16fc6dc1889e1ae7d02d52e2ff9d714059 |
redhat-ds-admin-debuginfo-9.1.0-1.el6.i386.rpm | SHA-256: cd20f40ce0bd3081041ebb480966b5c355229cd4e9dbdc366eb4e03b193d8fc5 |
redhat-ds-base-9.1.0-1.el6dsrv.i386.rpm | SHA-256: 837dcf0238bedf849263ad3fa03201149e72c2d36da3d2665096bfc2b0fd7cd5 |
redhat-ds-base-debuginfo-9.1.0-1.el6dsrv.i386.rpm | SHA-256: 677e9d60e869d071669a17253a09a58af741ca9aac104b7a5a022d2e17011ecb |
redhat-ds-base-devel-9.1.0-1.el6dsrv.i386.rpm | SHA-256: e61baf5e82dc51cd25afcb13787c4e75a87a668885198c67a7efd6e6bec5bfd4 |
redhat-ds-console-9.1.0-1.el6.noarch.rpm | SHA-256: 4cbd649bdadf86531c6680e9b092233aaa07b2a1485692e6388306999cbbdd76 |
redhat-ds-console-doc-9.1.0-1.el6.noarch.rpm | SHA-256: c331d8c7c5ba7fe9b4e6a3468d06f467340799248b465bab7694bf2b003e1b50 |
redhat-idm-console-9.1.0-1.el6.i386.rpm | SHA-256: 5921fccf6c051b6c6dbb4e03f41d19d7283f3f75fdb571fad9d9c571109b4b34 |
redhat-idm-console-debuginfo-9.1.0-1.el6.i386.rpm | SHA-256: 388ab5936234d47d503ccde00ef03335d33500a05ea6a27bafb544ccdd9c6915 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.