- Issued:
- 2004-05-11
- Updated:
- 2004-05-11
RHBA-2004:212 - Bug Fix Advisory
Synopsis
Updated shadow-utils package available
Type/Severity
Bug Fix Advisory
Topic
An updated shadow-utils package that addresses several bugs and implements several
enhancements is now available.
Description
The shadow-utils package includes the necessary programs for converting UNIX password files
to the shadow password format, including programs for managing user and group accounts. The
pwconv command converts passwords to the shadow password format. The pwunconv command
unconverts shadow passwords and generates an npasswd file (a standard UNIX password file).
The pwck command checks the integrity of password and shadow files. The lastlog command
prints out the last login times for all users. The useradd, userdel, and usermod commands are
used for managing user accounts. The groupadd, groupdel, and groupmod commands
are used for managing group accounts.
The shadow-utils package has been updated so that the /etc/default/nss file is readable for
normal users, by changing the restrictive permissions on /etc/default which disallowed its
access.
Users of Red Hat Enterprise Linux 3 should upgrade to this updated package.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL Certificate
Errors, you need to install a version of the up2date client with an updated
certificate. The latest version of up2date is available from the Red Hat
FTP site and may also be downloaded directly from the RHN website:
Affected Products
- Red Hat Enterprise Linux Server 3 x86_64
- Red Hat Enterprise Linux Server 3 ia64
- Red Hat Enterprise Linux Server 3 i386
- Red Hat Enterprise Linux Workstation 3 x86_64
- Red Hat Enterprise Linux Workstation 3 ia64
- Red Hat Enterprise Linux Workstation 3 i386
- Red Hat Enterprise Linux for IBM z Systems 3 s390x
- Red Hat Enterprise Linux for IBM z Systems 3 s390
- Red Hat Enterprise Linux for Power, big endian 3 ppc
Fixes
- BZ - 103576 - RHEL 2.1 U4: Modify behavior of getservbyname() to be more efficient when no protocol is specified and service name is being pulled from NIS.
- BZ - 109606 - sed crashes on garbage multibyte sequence
- BZ - 109790 - broken pthread_exit() in NPTL static
- BZ - 110252 - glibc should BuildRequire: texinfo
- BZ - 110401 - regex library mem leaks
- BZ - 112208 - memory leak when creating threads with user defined stacksize
- BZ - 112512 - pthread_setcancelstate does not work
- BZ - 112602 - Strange pthread_testcancel exception behavior
- BZ - 112726 - pmap_set leaks file descriptors on failure
- BZ - 112869 - grep -iE segfaults using \W unless LANG=C
- BZ - 115349 - mutex hang when using pthread_cond_broadcast() under high contention
- BZ - 116526 - Memory leak in getaddrinfo().
- BZ - 116606 - mbtowc() doesn't like large SIZE parameter values
- BZ - 118338 - RHEL 3 U2: NETID_AUTHORITATIVE functionality in glibc
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.