Skip to navigation

Bug Fix Advisory ypserv bug fix update

Advisory: RHBA-2012:0379-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-03-13
Last updated on: 2012-03-13
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

An updated ypserv package that fixes one bug is now available for Red Hat
Enterprise Linux 5.

The ypserv package contains the Network Information Service (NIS) server, which
provides network information (login names, passwords, home directories, group
information) to all of the machines on a network. It can enable users to log in
on any machine on the network as long as the machine has the Network Information
Service (NIS) client programs running and the user's password is recorded in the
NIS passwd database. NIS was formerly known as Sun Yellow Pages (YP).

This update fixes the following bug:

* When requesting entries from a non-existing NIS map, the ypserv daemon
incorrectly returned 0 (YP_FALSE) instead of -1 (YP_NOMAP). This caused the
autofs utility to fail, and thus prevented file systems from being mounted
automatically. With this update, ypserv returns the correct return code and
autofs works as expected in this scenario. (BZ#788445)

All users of ypserv are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ypserv-2.19-9.el5_8.1.src.rpm
File outdated by:  RHBA-2013:0660
    MD5: 20444831218b47a4e87fe2a220477497
SHA-256: fb90ce2076f7f6d3ae3b3a095f52d16c99d86a4643d61910c7e218ae9733f371
 
IA-32:
ypserv-2.19-9.el5_8.1.i386.rpm
File outdated by:  RHBA-2013:0660
    MD5: 037296ec2ea68f942bd1bfd133d25f28
SHA-256: 37e362e2fa8c29cadad3d3049f01ccdfd57e3797f7865b225645cd85a14960fd
ypserv-debuginfo-2.19-9.el5_8.1.i386.rpm
File outdated by:  RHBA-2013:0660
    MD5: d22ca7717406a42d90cae6c0795d45f4
SHA-256: 8e7dd455d34b293c3d5607d98fc283c3566c47b6f13dd04fa0648597f2f5c985
 
x86_64:
ypserv-2.19-9.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2013:0660
    MD5: 6abac1732bd49d0658a4ae3d41d70002
SHA-256: b37007b8b872023d59a2fe432da372ef4446c297f7dcc23302ed965fa0af3098
ypserv-debuginfo-2.19-9.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2013:0660
    MD5: dea5d1a8697ff3361e84e406431b833f
SHA-256: 0092319c91d09fc5f575395337169cada493a59587b741551c0eafbaf8307cf0
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ypserv-2.19-9.el5_8.1.src.rpm
File outdated by:  RHBA-2013:0660
    MD5: 20444831218b47a4e87fe2a220477497
SHA-256: fb90ce2076f7f6d3ae3b3a095f52d16c99d86a4643d61910c7e218ae9733f371
 
IA-32:
ypserv-2.19-9.el5_8.1.i386.rpm
File outdated by:  RHBA-2013:0660
    MD5: 037296ec2ea68f942bd1bfd133d25f28
SHA-256: 37e362e2fa8c29cadad3d3049f01ccdfd57e3797f7865b225645cd85a14960fd
ypserv-debuginfo-2.19-9.el5_8.1.i386.rpm
File outdated by:  RHBA-2013:0660
    MD5: d22ca7717406a42d90cae6c0795d45f4
SHA-256: 8e7dd455d34b293c3d5607d98fc283c3566c47b6f13dd04fa0648597f2f5c985
 
IA-64:
ypserv-2.19-9.el5_8.1.ia64.rpm
File outdated by:  RHBA-2013:0660
    MD5: d5d94fedbc355bbd61be33c6fc785274
SHA-256: 2f5ed978b40da5fb61e041ba5b38f4d75ecf4e3506c5d52c692af838b4b4cff1
ypserv-debuginfo-2.19-9.el5_8.1.ia64.rpm
File outdated by:  RHBA-2013:0660
    MD5: f2d140d429d76bda3afeb277040b91ae
SHA-256: f8297b256f6f0997c08b18507e9dfda47cdcd0d844eb47b954f3a86b7570b7f6
 
PPC:
ypserv-2.19-9.el5_8.1.ppc.rpm
File outdated by:  RHBA-2013:0660
    MD5: a87aa3cc9f957ce7de1d144542223978
SHA-256: 1632536bc9d80abbfaadaf0fb8bb0738519fed49c91c3f8c2cc0736cf457f030
ypserv-debuginfo-2.19-9.el5_8.1.ppc.rpm
File outdated by:  RHBA-2013:0660
    MD5: ac2eaaff61aa2558135977641671739e
SHA-256: 0f3cf51c41011796decd612afdc058887f6708615e8c7cf4d7d006b8ae127f8e
 
s390x:
ypserv-2.19-9.el5_8.1.s390x.rpm
File outdated by:  RHBA-2013:0660
    MD5: 9da771a6cbaf200120af78c18bfa4fad
SHA-256: 7300754b0f52f0f90763bef9d8a5e9b1e6dbf8d7e7c72485938bd7b328ff786a
ypserv-debuginfo-2.19-9.el5_8.1.s390x.rpm
File outdated by:  RHBA-2013:0660
    MD5: 8c3cc460b84da508b51b98badfaffba7
SHA-256: 80d54f409f5f71adf90eb5505057b2a0aa6e012a1bdfa3be3c587077261cf7ab
 
x86_64:
ypserv-2.19-9.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2013:0660
    MD5: 6abac1732bd49d0658a4ae3d41d70002
SHA-256: b37007b8b872023d59a2fe432da372ef4446c297f7dcc23302ed965fa0af3098
ypserv-debuginfo-2.19-9.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2013:0660
    MD5: dea5d1a8697ff3361e84e406431b833f
SHA-256: 0092319c91d09fc5f575395337169cada493a59587b741551c0eafbaf8307cf0
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/