Skip to navigation

Bug Fix Advisory ypserv bug fix update

Advisory: RHBA-2011:0444-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-04-14
Last updated on: 2011-04-14
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

An updated ypserv package that fixes a bug is now available.

The Network Information Service (NIS) is a system that provides network
information (login names, passwords, home directories, group information) to all
of the machines on a network.

This updated ypserv package fixes the following bug:

* Due to a string concatenation error in the code, running the "yppasswdd"
command and using the "-x" option, which instructs yppasswdd to pass data to an
external program to update the source files and maps, could have caused garbage
characters to be inserted in front of the username, thus causing the output to
become unparseable. This has been resolved in this updated package by changing
the operation to a string-copy, with the result that the username is no longer
corrupted when using the "-x" option. (BZ#688237)

All users of ypserv are advised to upgrade to this updated package, which
resolves this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ypserv-2.19-5.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0660
    MD5: aa77e17d0a7bf7a53965f62f1ef7abf0
SHA-256: e5b1306411867d9145bffad1f37dc5e92a07e7183206306490295e5335f2e541
 
IA-32:
ypserv-2.19-5.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0660
    MD5: 3435a43a33a84036419b4ca930bfb72f
SHA-256: 869c6f8e7b96069b778c3bc41d942eaa922f8ea1c277b72a4d2feae6717a787e
 
x86_64:
ypserv-2.19-5.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:0660
    MD5: f9057eb039dcc60795227ffebfda72e0
SHA-256: bb68d9ef42df4a0126af4d02bb20bfa7519bba205b24a85b07cbd7bad172b7ef
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ypserv-2.19-5.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0660
    MD5: aa77e17d0a7bf7a53965f62f1ef7abf0
SHA-256: e5b1306411867d9145bffad1f37dc5e92a07e7183206306490295e5335f2e541
 
IA-32:
ypserv-2.19-5.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0660
    MD5: 3435a43a33a84036419b4ca930bfb72f
SHA-256: 869c6f8e7b96069b778c3bc41d942eaa922f8ea1c277b72a4d2feae6717a787e
 
IA-64:
ypserv-2.19-5.el5_6.1.ia64.rpm
File outdated by:  RHBA-2013:0660
    MD5: 489f735e8e85f6aff8f71bae41779aa2
SHA-256: 3fc385a92e37c449913795a8c6d58ab745245aa8622882a969b8b1cb1864a504
 
PPC:
ypserv-2.19-5.el5_6.1.ppc.rpm
File outdated by:  RHBA-2013:0660
    MD5: a3d179b0efcbcaa74a61a8ecd20a2997
SHA-256: 275985d7aa903a6751c3be99a48df94ba54c2795a81910600892ad807d11b8a3
 
s390x:
ypserv-2.19-5.el5_6.1.s390x.rpm
File outdated by:  RHBA-2013:0660
    MD5: 8854899760c4b72d714c29320e9fe37a
SHA-256: ec0c39a608f8a1b32aab12c0f021585604d3c39911546fd10134f7a3fdac17b1
 
x86_64:
ypserv-2.19-5.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:0660
    MD5: f9057eb039dcc60795227ffebfda72e0
SHA-256: bb68d9ef42df4a0126af4d02bb20bfa7519bba205b24a85b07cbd7bad172b7ef
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
ypserv-2.19-5.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0660
    MD5: aa77e17d0a7bf7a53965f62f1ef7abf0
SHA-256: e5b1306411867d9145bffad1f37dc5e92a07e7183206306490295e5335f2e541
 
IA-32:
ypserv-2.19-5.el5_6.1.i386.rpm     MD5: 3435a43a33a84036419b4ca930bfb72f
SHA-256: 869c6f8e7b96069b778c3bc41d942eaa922f8ea1c277b72a4d2feae6717a787e
 
IA-64:
ypserv-2.19-5.el5_6.1.ia64.rpm     MD5: 489f735e8e85f6aff8f71bae41779aa2
SHA-256: 3fc385a92e37c449913795a8c6d58ab745245aa8622882a969b8b1cb1864a504
 
PPC:
ypserv-2.19-5.el5_6.1.ppc.rpm     MD5: a3d179b0efcbcaa74a61a8ecd20a2997
SHA-256: 275985d7aa903a6751c3be99a48df94ba54c2795a81910600892ad807d11b8a3
 
s390x:
ypserv-2.19-5.el5_6.1.s390x.rpm     MD5: 8854899760c4b72d714c29320e9fe37a
SHA-256: ec0c39a608f8a1b32aab12c0f021585604d3c39911546fd10134f7a3fdac17b1
 
x86_64:
ypserv-2.19-5.el5_6.1.x86_64.rpm     MD5: f9057eb039dcc60795227ffebfda72e0
SHA-256: bb68d9ef42df4a0126af4d02bb20bfa7519bba205b24a85b07cbd7bad172b7ef
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
ypserv-2.19-5.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0660
    MD5: aa77e17d0a7bf7a53965f62f1ef7abf0
SHA-256: e5b1306411867d9145bffad1f37dc5e92a07e7183206306490295e5335f2e541
 
IA-32:
ypserv-2.19-5.el5_6.1.i386.rpm     MD5: 3435a43a33a84036419b4ca930bfb72f
SHA-256: 869c6f8e7b96069b778c3bc41d942eaa922f8ea1c277b72a4d2feae6717a787e
 
IA-64:
ypserv-2.19-5.el5_6.1.ia64.rpm     MD5: 489f735e8e85f6aff8f71bae41779aa2
SHA-256: 3fc385a92e37c449913795a8c6d58ab745245aa8622882a969b8b1cb1864a504
 
x86_64:
ypserv-2.19-5.el5_6.1.x86_64.rpm     MD5: f9057eb039dcc60795227ffebfda72e0
SHA-256: bb68d9ef42df4a0126af4d02bb20bfa7519bba205b24a85b07cbd7bad172b7ef
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

688237 - yppasswdd -x has garbage prefixed to username



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/