Skip to navigation

Bug Fix Advisory ypserv bug fix update

Advisory: RHBA-2013:0660-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-03-19
Last updated on: 2013-03-19
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux EUS (v. 5.9.z server)
Red Hat Enterprise Linux Long Life (v. 5.9 server)

Details

Updated ypserv packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The ypserv packages provide the Network Information Service (NIS) server. NIS is
a system that provides network information such as login names, passwords, home
directories, and group information to all the machines on a network.

This update fixes the following bug:

* Previously, the ypserv utility allocated large amounts of virtual memory when
parsing XDR requests, but failed to free that memory if the request was not
parsed successfully. Consequently, memory leaks occurred. With this update, a
patch has been provided to free the already allocated memory when the parsing of
a request fails and, as a result, memory leaks no longer occur. (BZ#920111)

Users of ypserv are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ypserv-2.19-10.el5_9.1.src.rpm     MD5: 08627e46f9a65971d7f172b0a0d1f7e3
SHA-256: 580c1e22c81c9f01fb3e552796e45527783a9cba1508e1db31be612a41e5382b
 
IA-32:
ypserv-2.19-10.el5_9.1.i386.rpm     MD5: 830fa9bcca03685003776969c3c0d126
SHA-256: 434b23456971f436f3fb7877fbbc2706e5b7c058b9c783d8bd31004cab48d832
ypserv-debuginfo-2.19-10.el5_9.1.i386.rpm     MD5: a36ccc8b438e47180ed2eeb800661d41
SHA-256: 8dac50bebe8ca1206e105e2c88008f60f3686dcf90d5cbc7830cacd143be2d64
 
x86_64:
ypserv-2.19-10.el5_9.1.x86_64.rpm     MD5: 17de4fa7fc1729ec88ff55563a53767f
SHA-256: 149ca1e5cc1015a48d15aa60e5a7d1a8822ce7993b4bd3910fa95458306b9300
ypserv-debuginfo-2.19-10.el5_9.1.x86_64.rpm     MD5: 58c703e311d4124b0b39a35c429ed097
SHA-256: 3575dc76a2ba4611e44d3a013017bdbeb6db9b6b1162a51f6bde3217bd573fd6
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ypserv-2.19-10.el5_9.1.src.rpm     MD5: 08627e46f9a65971d7f172b0a0d1f7e3
SHA-256: 580c1e22c81c9f01fb3e552796e45527783a9cba1508e1db31be612a41e5382b
 
IA-32:
ypserv-2.19-10.el5_9.1.i386.rpm     MD5: 830fa9bcca03685003776969c3c0d126
SHA-256: 434b23456971f436f3fb7877fbbc2706e5b7c058b9c783d8bd31004cab48d832
ypserv-debuginfo-2.19-10.el5_9.1.i386.rpm     MD5: a36ccc8b438e47180ed2eeb800661d41
SHA-256: 8dac50bebe8ca1206e105e2c88008f60f3686dcf90d5cbc7830cacd143be2d64
 
IA-64:
ypserv-2.19-10.el5_9.1.ia64.rpm     MD5: 09c4812c5807e10655cff079e39fd3f9
SHA-256: b9d4fd568efa9e56c6b2708aabdb18695680139945bade62288e335e54c08deb
ypserv-debuginfo-2.19-10.el5_9.1.ia64.rpm     MD5: c51bdb013c51fa8ea1a595606d8313f5
SHA-256: 965b429e0761f2a9c53994c00e1f8f570d6b8a442855f9d8ac66338573832d17
 
PPC:
ypserv-2.19-10.el5_9.1.ppc.rpm     MD5: a908894fbbecb0f0a1878d1a4c718735
SHA-256: d4debab52b01fc2877ef03dcedeb1c01f1a33a4ad17c3adc6d376ace8f0ccac7
ypserv-debuginfo-2.19-10.el5_9.1.ppc.rpm     MD5: 3334b43f6622e06a4f3a6d9415a8f8a2
SHA-256: 9de48a8f95de853adb68c8846c3158d8a049ad82d7baeba86b4875ff7e64bda5
 
s390x:
ypserv-2.19-10.el5_9.1.s390x.rpm     MD5: 441c88d30cbd2a86c35f9327e5157ebe
SHA-256: 98b4a357409f10ff7798d92f62902dc71627bdc92cb784cf640f98107a2fc9aa
ypserv-debuginfo-2.19-10.el5_9.1.s390x.rpm     MD5: 12b1c113054ee96be3cb17cf1c64b439
SHA-256: 3a39522400e6a08bab506f88f8c45238a74d613990559ae57b60719a9b7dd702
 
x86_64:
ypserv-2.19-10.el5_9.1.x86_64.rpm     MD5: 17de4fa7fc1729ec88ff55563a53767f
SHA-256: 149ca1e5cc1015a48d15aa60e5a7d1a8822ce7993b4bd3910fa95458306b9300
ypserv-debuginfo-2.19-10.el5_9.1.x86_64.rpm     MD5: 58c703e311d4124b0b39a35c429ed097
SHA-256: 3575dc76a2ba4611e44d3a013017bdbeb6db9b6b1162a51f6bde3217bd573fd6
 
Red Hat Enterprise Linux EUS (v. 5.9.z server)

SRPMS:
ypserv-2.19-10.el5_9.1.src.rpm     MD5: 08627e46f9a65971d7f172b0a0d1f7e3
SHA-256: 580c1e22c81c9f01fb3e552796e45527783a9cba1508e1db31be612a41e5382b
 
IA-32:
ypserv-2.19-10.el5_9.1.i386.rpm     MD5: 830fa9bcca03685003776969c3c0d126
SHA-256: 434b23456971f436f3fb7877fbbc2706e5b7c058b9c783d8bd31004cab48d832
ypserv-debuginfo-2.19-10.el5_9.1.i386.rpm     MD5: a36ccc8b438e47180ed2eeb800661d41
SHA-256: 8dac50bebe8ca1206e105e2c88008f60f3686dcf90d5cbc7830cacd143be2d64
 
IA-64:
ypserv-2.19-10.el5_9.1.ia64.rpm     MD5: 09c4812c5807e10655cff079e39fd3f9
SHA-256: b9d4fd568efa9e56c6b2708aabdb18695680139945bade62288e335e54c08deb
ypserv-debuginfo-2.19-10.el5_9.1.ia64.rpm     MD5: c51bdb013c51fa8ea1a595606d8313f5
SHA-256: 965b429e0761f2a9c53994c00e1f8f570d6b8a442855f9d8ac66338573832d17
 
PPC:
ypserv-2.19-10.el5_9.1.ppc.rpm     MD5: a908894fbbecb0f0a1878d1a4c718735
SHA-256: d4debab52b01fc2877ef03dcedeb1c01f1a33a4ad17c3adc6d376ace8f0ccac7
ypserv-debuginfo-2.19-10.el5_9.1.ppc.rpm     MD5: 3334b43f6622e06a4f3a6d9415a8f8a2
SHA-256: 9de48a8f95de853adb68c8846c3158d8a049ad82d7baeba86b4875ff7e64bda5
 
s390x:
ypserv-2.19-10.el5_9.1.s390x.rpm     MD5: 441c88d30cbd2a86c35f9327e5157ebe
SHA-256: 98b4a357409f10ff7798d92f62902dc71627bdc92cb784cf640f98107a2fc9aa
ypserv-debuginfo-2.19-10.el5_9.1.s390x.rpm     MD5: 12b1c113054ee96be3cb17cf1c64b439
SHA-256: 3a39522400e6a08bab506f88f8c45238a74d613990559ae57b60719a9b7dd702
 
x86_64:
ypserv-2.19-10.el5_9.1.x86_64.rpm     MD5: 17de4fa7fc1729ec88ff55563a53767f
SHA-256: 149ca1e5cc1015a48d15aa60e5a7d1a8822ce7993b4bd3910fa95458306b9300
ypserv-debuginfo-2.19-10.el5_9.1.x86_64.rpm     MD5: 58c703e311d4124b0b39a35c429ed097
SHA-256: 3575dc76a2ba4611e44d3a013017bdbeb6db9b6b1162a51f6bde3217bd573fd6
 
Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
ypserv-2.19-10.el5_9.1.src.rpm     MD5: 08627e46f9a65971d7f172b0a0d1f7e3
SHA-256: 580c1e22c81c9f01fb3e552796e45527783a9cba1508e1db31be612a41e5382b
 
IA-32:
ypserv-2.19-10.el5_9.1.i386.rpm     MD5: 830fa9bcca03685003776969c3c0d126
SHA-256: 434b23456971f436f3fb7877fbbc2706e5b7c058b9c783d8bd31004cab48d832
ypserv-debuginfo-2.19-10.el5_9.1.i386.rpm     MD5: a36ccc8b438e47180ed2eeb800661d41
SHA-256: 8dac50bebe8ca1206e105e2c88008f60f3686dcf90d5cbc7830cacd143be2d64
 
IA-64:
ypserv-2.19-10.el5_9.1.ia64.rpm     MD5: 09c4812c5807e10655cff079e39fd3f9
SHA-256: b9d4fd568efa9e56c6b2708aabdb18695680139945bade62288e335e54c08deb
ypserv-debuginfo-2.19-10.el5_9.1.ia64.rpm     MD5: c51bdb013c51fa8ea1a595606d8313f5
SHA-256: 965b429e0761f2a9c53994c00e1f8f570d6b8a442855f9d8ac66338573832d17
 
x86_64:
ypserv-2.19-10.el5_9.1.x86_64.rpm     MD5: 17de4fa7fc1729ec88ff55563a53767f
SHA-256: 149ca1e5cc1015a48d15aa60e5a7d1a8822ce7993b4bd3910fa95458306b9300
ypserv-debuginfo-2.19-10.el5_9.1.x86_64.rpm     MD5: 58c703e311d4124b0b39a35c429ed097
SHA-256: 3575dc76a2ba4611e44d3a013017bdbeb6db9b6b1162a51f6bde3217bd573fd6
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/