Skip to navigation

Bug Fix Advisory ypserv bug fix update

Advisory: RHBA-2010:0540-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-07-20
Last updated on: 2010-07-20
Affected Products: Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)

Details

An updated ypserv package that fixes a bug is now available.

The ypserv package contains the Network Information Service (NIS) server, a
system that provides network information (that is, login names, passwords, home
directories, and group information) to other machines in the network.

This update fixes the following bug:

* due to an incorrect handling of pointers, using ypinit to build the S390x NIS
slave server against the Solaris 10 UltraSPARC NIS master resulted in the
following error:

*** glibc detected *** free(): invalid pointer: 0x00000200001a1000 ***

With this update, the slave server no longer stops responding when the invalid
pointer is freed, and ypinit builds a set of administrative system maps as
expected. (BZ#598924)

Users are advised to upgrade to this updated ypserv package, which resolve this
issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux AS (v. 4)

SRPMS:
ypserv-2.13-19.el4_8.2.src.rpm     MD5: 693650a5d901411daebecc2625b691de
SHA-256: aa8184732214f213a9f78788053f11303a9876764c2e1d32168fcdb5202f03d7
 
IA-32:
ypserv-2.13-19.el4_8.2.i386.rpm     MD5: 5a7a3e36773e9d64e4d7e77df092adde
SHA-256: 59922489a5909b78560e06840b81b50161e07edf0f9ad951b64cbe81609a50a4
 
IA-64:
ypserv-2.13-19.el4_8.2.ia64.rpm     MD5: 18d037ab558c3c171491ea95e9de4672
SHA-256: e125c7bdb7728fc31c36984524e33276b69319f9e8ec1cdab8074a3b6d227d53
 
PPC:
ypserv-2.13-19.el4_8.2.ppc.rpm     MD5: 493a45875da0f64bc90aedc8366020cd
SHA-256: f76e57510c32040bd7cec04d2cf370fe2aa7c6ebb278a0d842f2eff2e9e3ae88
 
s390:
ypserv-2.13-19.el4_8.2.s390.rpm     MD5: 5fc3e67dd055efa8f437c98845144a95
SHA-256: d7c34e50f1b76ae94796a055bbffe38484a4d3a1224a39f6a9ffdbf1bfc6d4ea
 
s390x:
ypserv-2.13-19.el4_8.2.s390x.rpm     MD5: c82f9d6972ee8658b8e00e0e1d771764
SHA-256: f4f926567c29571f878e652b7496fe493bda8514d2a2f6c0e41eb2c448d6306f
 
x86_64:
ypserv-2.13-19.el4_8.2.x86_64.rpm     MD5: adad35d44ae3fac381835a898311a8e8
SHA-256: d4b15d66c7ccc49f4302a3a995d703138c6ac4e71ed8429e1e739c032e7b03c0
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
ypserv-2.13-19.el4_8.2.src.rpm     MD5: 693650a5d901411daebecc2625b691de
SHA-256: aa8184732214f213a9f78788053f11303a9876764c2e1d32168fcdb5202f03d7
 
IA-32:
ypserv-2.13-19.el4_8.2.i386.rpm     MD5: 5a7a3e36773e9d64e4d7e77df092adde
SHA-256: 59922489a5909b78560e06840b81b50161e07edf0f9ad951b64cbe81609a50a4
 
IA-64:
ypserv-2.13-19.el4_8.2.ia64.rpm     MD5: 18d037ab558c3c171491ea95e9de4672
SHA-256: e125c7bdb7728fc31c36984524e33276b69319f9e8ec1cdab8074a3b6d227d53
 
PPC:
ypserv-2.13-19.el4_8.2.ppc.rpm     MD5: 493a45875da0f64bc90aedc8366020cd
SHA-256: f76e57510c32040bd7cec04d2cf370fe2aa7c6ebb278a0d842f2eff2e9e3ae88
 
s390:
ypserv-2.13-19.el4_8.2.s390.rpm     MD5: 5fc3e67dd055efa8f437c98845144a95
SHA-256: d7c34e50f1b76ae94796a055bbffe38484a4d3a1224a39f6a9ffdbf1bfc6d4ea
 
s390x:
ypserv-2.13-19.el4_8.2.s390x.rpm     MD5: c82f9d6972ee8658b8e00e0e1d771764
SHA-256: f4f926567c29571f878e652b7496fe493bda8514d2a2f6c0e41eb2c448d6306f
 
x86_64:
ypserv-2.13-19.el4_8.2.x86_64.rpm     MD5: adad35d44ae3fac381835a898311a8e8
SHA-256: d4b15d66c7ccc49f4302a3a995d703138c6ac4e71ed8429e1e739c032e7b03c0
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
ypserv-2.13-19.el4_8.2.src.rpm     MD5: 693650a5d901411daebecc2625b691de
SHA-256: aa8184732214f213a9f78788053f11303a9876764c2e1d32168fcdb5202f03d7
 
IA-32:
ypserv-2.13-19.el4_8.2.i386.rpm     MD5: 5a7a3e36773e9d64e4d7e77df092adde
SHA-256: 59922489a5909b78560e06840b81b50161e07edf0f9ad951b64cbe81609a50a4
 
IA-64:
ypserv-2.13-19.el4_8.2.ia64.rpm     MD5: 18d037ab558c3c171491ea95e9de4672
SHA-256: e125c7bdb7728fc31c36984524e33276b69319f9e8ec1cdab8074a3b6d227d53
 
x86_64:
ypserv-2.13-19.el4_8.2.x86_64.rpm     MD5: adad35d44ae3fac381835a898311a8e8
SHA-256: d4b15d66c7ccc49f4302a3a995d703138c6ac4e71ed8429e1e739c032e7b03c0
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
ypserv-2.13-19.el4_8.2.src.rpm     MD5: 693650a5d901411daebecc2625b691de
SHA-256: aa8184732214f213a9f78788053f11303a9876764c2e1d32168fcdb5202f03d7
 
IA-32:
ypserv-2.13-19.el4_8.2.i386.rpm     MD5: 5a7a3e36773e9d64e4d7e77df092adde
SHA-256: 59922489a5909b78560e06840b81b50161e07edf0f9ad951b64cbe81609a50a4
 
IA-64:
ypserv-2.13-19.el4_8.2.ia64.rpm     MD5: 18d037ab558c3c171491ea95e9de4672
SHA-256: e125c7bdb7728fc31c36984524e33276b69319f9e8ec1cdab8074a3b6d227d53
 
x86_64:
ypserv-2.13-19.el4_8.2.x86_64.rpm     MD5: adad35d44ae3fac381835a898311a8e8
SHA-256: d4b15d66c7ccc49f4302a3a995d703138c6ac4e71ed8429e1e739c032e7b03c0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

598924 - ypxfr spits out invalid pointer errors


Keywords

S390, Solaris, ypinit, ypserv


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/