Skip to navigation

Bug Fix Advisory shadow-utils bug fix update

Advisory: RHBA-2011:0823-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-23
Last updated on: 2011-05-23
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

An updated shadow-utils package that fixes three bugs is now available for Red
Hat Enterprise Linux 5.

The shadow-utils package includes programs for converting UNIX password files to
the shadow password format, as well as tools for managing user and group
accounts.

This update fixes the following bugs:

* When a new user is created, the content of the /etc/skel/ directory is copied
to the user's home directory. Previously, an attempt to copy these files and
directories from a file system with the support for access control lists (ACLs)
enabled to a file system with ACLs disabled failed with an error, and some files
were not copied. With this update, a patch has been applied to address this
issue, and when a new user is created, the content of the /etc/skel/ directory
is now successfully copied without an error. (BZ#690829)

* Due to incorrect handling of large user and group identifiers (that is, UIDs
and GIDs) on 32-bit systems, the pwconv and pwunconv utilities changed all
identifiers greater than 2147483647 to this value. With this update, the
underlying source code has been adapted to ensure the pwconv and pwunconv
utilities no longer alter the GIDs and UIDs. (BZ#690830)

* Previously, the faillog utility executed command line options as they were
passed instead of parsing all options first. This update applies a patch that
corrects the utility to parse all command line options before executing the
commands. (BZ#690831)

All users of shadow-utils are advised to upgrade to this updated package, which
fixes these bugs.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
shadow-utils-4.0.17-18.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0040
    MD5: 7a13faec4eb351c73212d697b5bc1335
SHA-256: a3aadab545f3c5fb9da7a7abcd96288be6d67072f8c2da6e2257c6d35c69ae50
 
IA-32:
shadow-utils-4.0.17-18.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0040
    MD5: 640099322b2edee8b967b8fad727a101
SHA-256: affd2caf84793a7bdd19ee9e0e4add2a92cd213f9ae872cab6bb92545e048957
 
IA-64:
shadow-utils-4.0.17-18.el5_6.1.ia64.rpm
File outdated by:  RHBA-2013:0040
    MD5: 1416140729244da92be318cb62379f85
SHA-256: 2643666b971ae3b7f690f408f4664fd7734e8e8cb4a20a943ba0f2bc06d0f765
 
PPC:
shadow-utils-4.0.17-18.el5_6.1.ppc.rpm
File outdated by:  RHBA-2013:0040
    MD5: eb849d8acf6f089dfb449f7d05859380
SHA-256: 039de3ffd8bf62e722aa527111ee3501da2c5444d590079dcc55a7b551e3315d
 
s390x:
shadow-utils-4.0.17-18.el5_6.1.s390x.rpm
File outdated by:  RHBA-2013:0040
    MD5: 8a48631c4295676e42b4b8cee994db36
SHA-256: 85d3310e7445e164fc0d0017d57f64605d87ca82313d97dbf343a6121dd4591e
 
x86_64:
shadow-utils-4.0.17-18.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:0040
    MD5: cf295f92716364928a0365f484ca2864
SHA-256: 8e16ec1c402a2c8ad69bba1bc3d341ef8dee68379adfa03e573f4d9ffa900bf0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
shadow-utils-4.0.17-18.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0040
    MD5: 7a13faec4eb351c73212d697b5bc1335
SHA-256: a3aadab545f3c5fb9da7a7abcd96288be6d67072f8c2da6e2257c6d35c69ae50
 
IA-32:
shadow-utils-4.0.17-18.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0040
    MD5: 640099322b2edee8b967b8fad727a101
SHA-256: affd2caf84793a7bdd19ee9e0e4add2a92cd213f9ae872cab6bb92545e048957
 
x86_64:
shadow-utils-4.0.17-18.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:0040
    MD5: cf295f92716364928a0365f484ca2864
SHA-256: 8e16ec1c402a2c8ad69bba1bc3d341ef8dee68379adfa03e573f4d9ffa900bf0
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
shadow-utils-4.0.17-18.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0040
    MD5: 7a13faec4eb351c73212d697b5bc1335
SHA-256: a3aadab545f3c5fb9da7a7abcd96288be6d67072f8c2da6e2257c6d35c69ae50
 
IA-32:
shadow-utils-4.0.17-18.el5_6.1.i386.rpm     MD5: 640099322b2edee8b967b8fad727a101
SHA-256: affd2caf84793a7bdd19ee9e0e4add2a92cd213f9ae872cab6bb92545e048957
 
IA-64:
shadow-utils-4.0.17-18.el5_6.1.ia64.rpm     MD5: 1416140729244da92be318cb62379f85
SHA-256: 2643666b971ae3b7f690f408f4664fd7734e8e8cb4a20a943ba0f2bc06d0f765
 
PPC:
shadow-utils-4.0.17-18.el5_6.1.ppc.rpm     MD5: eb849d8acf6f089dfb449f7d05859380
SHA-256: 039de3ffd8bf62e722aa527111ee3501da2c5444d590079dcc55a7b551e3315d
 
s390x:
shadow-utils-4.0.17-18.el5_6.1.s390x.rpm     MD5: 8a48631c4295676e42b4b8cee994db36
SHA-256: 85d3310e7445e164fc0d0017d57f64605d87ca82313d97dbf343a6121dd4591e
 
x86_64:
shadow-utils-4.0.17-18.el5_6.1.x86_64.rpm     MD5: cf295f92716364928a0365f484ca2864
SHA-256: 8e16ec1c402a2c8ad69bba1bc3d341ef8dee68379adfa03e573f4d9ffa900bf0
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
shadow-utils-4.0.17-18.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0040
    MD5: 7a13faec4eb351c73212d697b5bc1335
SHA-256: a3aadab545f3c5fb9da7a7abcd96288be6d67072f8c2da6e2257c6d35c69ae50
 
IA-32:
shadow-utils-4.0.17-18.el5_6.1.i386.rpm     MD5: 640099322b2edee8b967b8fad727a101
SHA-256: affd2caf84793a7bdd19ee9e0e4add2a92cd213f9ae872cab6bb92545e048957
 
IA-64:
shadow-utils-4.0.17-18.el5_6.1.ia64.rpm     MD5: 1416140729244da92be318cb62379f85
SHA-256: 2643666b971ae3b7f690f408f4664fd7734e8e8cb4a20a943ba0f2bc06d0f765
 
x86_64:
shadow-utils-4.0.17-18.el5_6.1.x86_64.rpm     MD5: cf295f92716364928a0365f484ca2864
SHA-256: 8e16ec1c402a2c8ad69bba1bc3d341ef8dee68379adfa03e573f4d9ffa900bf0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

690829 - No file in /etc/skel is copied by useradd
690830 - pwconv and pwunconv alter uids over 2147483647
690831 - faillog excutes during argument parsing



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/