Skip to navigation

Bug Fix Advisory ipa-client bug fix update

Advisory: RHBA-2011:0832-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-27
Last updated on: 2011-05-27
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

An updated ipa-client package that fixes one bug is now available for Red Hat
Enterprise Linux 5.

The ipa-client package provides a tool to enroll a machine to an IPA version 2
server. IPA (Identity, Policy, Audit) is an integrated solution to provide
centrally managed identity, that is, machine, user, virtual machines, groups,
and authentication credentials.

This update fixes the following bug:

* Previously, the ipa-client used the wrong object identifier (OID). This update
corrects this issue. Now, the ipa-client uses the same OID as the server (BZ
#704649)

All IPA users are advised to upgrade to this updated package which, fixes this
bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ipa-client-2.0-10.el5_6.1.src.rpm
File outdated by:  RHBA-2013:1334
    MD5: d6213333a1209dfe71c46256235d1c65
SHA-256: 27e5940c941ed7f493061905353f042c27b721629c48cfe110e5167c52645fa7
 
IA-32:
ipa-client-2.0-10.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:1334
    MD5: 182ceb0e57ce8fd65ebf35ffe0bef383
SHA-256: 09e75fa1f0753ebb4d74ff7392c0e7b10664d83b0eb78e25a45033a7f43dae32
 
IA-64:
ipa-client-2.0-10.el5_6.1.ia64.rpm
File outdated by:  RHBA-2013:1334
    MD5: be16369c18510880fd8dcd57a5523e30
SHA-256: e3f2f0ac6dd44669ea89d76d96e0eb56e07188550c7cb3db801ab7555ed9123e
 
PPC:
ipa-client-2.0-10.el5_6.1.ppc.rpm
File outdated by:  RHBA-2013:1334
    MD5: c3b773c7a36887363f1685c512a34782
SHA-256: 766a637ba6998820f325cd4d55dd0f9c6e925df89070e70baeeb7c09efcb2edb
 
s390x:
ipa-client-2.0-10.el5_6.1.s390x.rpm
File outdated by:  RHBA-2013:1334
    MD5: cb64b15a89d9ae4d5eb9fd0f281ca111
SHA-256: d307124cc0a630b74ae1ff76e5c031c490979974a6e33cc1cdb137dd338f9917
 
x86_64:
ipa-client-2.0-10.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:1334
    MD5: 14bcdea58d9c45dfeaccc75db9687861
SHA-256: 7f1887a16442c307c6e81caaa2dc649d1ac8f0c9f1bfb288054b3798de69ea80
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ipa-client-2.0-10.el5_6.1.src.rpm
File outdated by:  RHBA-2013:1334
    MD5: d6213333a1209dfe71c46256235d1c65
SHA-256: 27e5940c941ed7f493061905353f042c27b721629c48cfe110e5167c52645fa7
 
IA-32:
ipa-client-2.0-10.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:1334
    MD5: 182ceb0e57ce8fd65ebf35ffe0bef383
SHA-256: 09e75fa1f0753ebb4d74ff7392c0e7b10664d83b0eb78e25a45033a7f43dae32
 
x86_64:
ipa-client-2.0-10.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:1334
    MD5: 14bcdea58d9c45dfeaccc75db9687861
SHA-256: 7f1887a16442c307c6e81caaa2dc649d1ac8f0c9f1bfb288054b3798de69ea80
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
ipa-client-2.0-10.el5_6.1.src.rpm
File outdated by:  RHBA-2013:1334
    MD5: d6213333a1209dfe71c46256235d1c65
SHA-256: 27e5940c941ed7f493061905353f042c27b721629c48cfe110e5167c52645fa7
 
IA-32:
ipa-client-2.0-10.el5_6.1.i386.rpm     MD5: 182ceb0e57ce8fd65ebf35ffe0bef383
SHA-256: 09e75fa1f0753ebb4d74ff7392c0e7b10664d83b0eb78e25a45033a7f43dae32
 
IA-64:
ipa-client-2.0-10.el5_6.1.ia64.rpm     MD5: be16369c18510880fd8dcd57a5523e30
SHA-256: e3f2f0ac6dd44669ea89d76d96e0eb56e07188550c7cb3db801ab7555ed9123e
 
PPC:
ipa-client-2.0-10.el5_6.1.ppc.rpm     MD5: c3b773c7a36887363f1685c512a34782
SHA-256: 766a637ba6998820f325cd4d55dd0f9c6e925df89070e70baeeb7c09efcb2edb
 
s390x:
ipa-client-2.0-10.el5_6.1.s390x.rpm     MD5: cb64b15a89d9ae4d5eb9fd0f281ca111
SHA-256: d307124cc0a630b74ae1ff76e5c031c490979974a6e33cc1cdb137dd338f9917
 
x86_64:
ipa-client-2.0-10.el5_6.1.x86_64.rpm     MD5: 14bcdea58d9c45dfeaccc75db9687861
SHA-256: 7f1887a16442c307c6e81caaa2dc649d1ac8f0c9f1bfb288054b3798de69ea80
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
ipa-client-2.0-10.el5_6.1.src.rpm
File outdated by:  RHBA-2013:1334
    MD5: d6213333a1209dfe71c46256235d1c65
SHA-256: 27e5940c941ed7f493061905353f042c27b721629c48cfe110e5167c52645fa7
 
IA-32:
ipa-client-2.0-10.el5_6.1.i386.rpm     MD5: 182ceb0e57ce8fd65ebf35ffe0bef383
SHA-256: 09e75fa1f0753ebb4d74ff7392c0e7b10664d83b0eb78e25a45033a7f43dae32
 
IA-64:
ipa-client-2.0-10.el5_6.1.ia64.rpm     MD5: be16369c18510880fd8dcd57a5523e30
SHA-256: e3f2f0ac6dd44669ea89d76d96e0eb56e07188550c7cb3db801ab7555ed9123e
 
x86_64:
ipa-client-2.0-10.el5_6.1.x86_64.rpm     MD5: 14bcdea58d9c45dfeaccc75db9687861
SHA-256: 7f1887a16442c307c6e81caaa2dc649d1ac8f0c9f1bfb288054b3798de69ea80
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/