- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2013:0019 - Bug Fix Advisory
Synopsis
ipa-client bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ipa-client packages that fixes two bugs are now available for Red Hat
Enterprise Linux 5.
Description
The ipa-client package provides a tool to enroll a machine to an IPA version 2
server. IPA (Identity, Policy, Audit) is an integrated solution to provide
centrally managed identity, that is, machine, user, virtual machines, groups,
and authentication credentials.
This update fixes the following bugs:
- During the installation, the ipa-client-install utility created a zero-length
/etc/sysconfig/network file. Consequently, the information about the network
configuration was not specified. The underlying source code has been modified
and the installation process no longer erases the configuration file.
(BZ#813387)
- If the client requested keys for encryption types that the server did not
support, and the requested key was not returned, the ipa-getkeytab utility, and
consequently the client enrollment, failed. With this update, the ipa-getkeytab
utility has been modified to no longer fail if the key is not retrieved; a
warning message is now displayed instead. (BZ#816693)
All users of ipa-client are advised to upgrade to these updated packages, which
fix these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 813387 - zero-length /etc/sysconfig/network file
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ipa-client-2.1.3-4.el5.src.rpm | SHA-256: e729998d5c9eee55b91d144da5a62a62e5c862405893f589230dd7299c7a366d |
x86_64 | |
ipa-client-2.1.3-4.el5.x86_64.rpm | SHA-256: f5bfa05d5053872c0eab8e9e2f77578edcc9593056e27c6d1628e767f9d7a42e |
ipa-client-debuginfo-2.1.3-4.el5.x86_64.rpm | SHA-256: 72c049b894cf4f88664dd93096b8ee38e623bbf040de527115e4e488450b031a |
ia64 | |
ipa-client-2.1.3-4.el5.ia64.rpm | SHA-256: 224455bab1934aee9fecfe31c7b36928b5ddc98fe9b07fb53fd9f5d8ca0c76f8 |
ipa-client-debuginfo-2.1.3-4.el5.ia64.rpm | SHA-256: 52ac17a2144b5f051ff83415fe51fe936edc2bdf77799b461dab6b079ab77b55 |
i386 | |
ipa-client-2.1.3-4.el5.i386.rpm | SHA-256: 093fac5588233a6e7607f7b8bdc1dfcca4196c9c6b9462f2990aba9b24f816cf |
ipa-client-debuginfo-2.1.3-4.el5.i386.rpm | SHA-256: 3da13fb2ae79ce77e4c4013ac4091cb9fcd6aec53e32b9c9294f9b6d682711b3 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ipa-client-2.1.3-4.el5.src.rpm | SHA-256: e729998d5c9eee55b91d144da5a62a62e5c862405893f589230dd7299c7a366d |
x86_64 | |
ipa-client-2.1.3-4.el5.x86_64.rpm | SHA-256: f5bfa05d5053872c0eab8e9e2f77578edcc9593056e27c6d1628e767f9d7a42e |
ipa-client-debuginfo-2.1.3-4.el5.x86_64.rpm | SHA-256: 72c049b894cf4f88664dd93096b8ee38e623bbf040de527115e4e488450b031a |
i386 | |
ipa-client-2.1.3-4.el5.i386.rpm | SHA-256: 093fac5588233a6e7607f7b8bdc1dfcca4196c9c6b9462f2990aba9b24f816cf |
ipa-client-debuginfo-2.1.3-4.el5.i386.rpm | SHA-256: 3da13fb2ae79ce77e4c4013ac4091cb9fcd6aec53e32b9c9294f9b6d682711b3 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
ipa-client-2.1.3-4.el5.src.rpm | SHA-256: e729998d5c9eee55b91d144da5a62a62e5c862405893f589230dd7299c7a366d |
x86_64 | |
ipa-client-2.1.3-4.el5.x86_64.rpm | SHA-256: f5bfa05d5053872c0eab8e9e2f77578edcc9593056e27c6d1628e767f9d7a42e |
ipa-client-debuginfo-2.1.3-4.el5.x86_64.rpm | SHA-256: 72c049b894cf4f88664dd93096b8ee38e623bbf040de527115e4e488450b031a |
i386 | |
ipa-client-2.1.3-4.el5.i386.rpm | SHA-256: 093fac5588233a6e7607f7b8bdc1dfcca4196c9c6b9462f2990aba9b24f816cf |
ipa-client-debuginfo-2.1.3-4.el5.i386.rpm | SHA-256: 3da13fb2ae79ce77e4c4013ac4091cb9fcd6aec53e32b9c9294f9b6d682711b3 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ipa-client-2.1.3-4.el5.src.rpm | SHA-256: e729998d5c9eee55b91d144da5a62a62e5c862405893f589230dd7299c7a366d |
s390x | |
ipa-client-2.1.3-4.el5.s390x.rpm | SHA-256: 2660b3120768fcb821659aaec504f9ac8ca48817499ddb58d1c88229a9cfea72 |
ipa-client-debuginfo-2.1.3-4.el5.s390x.rpm | SHA-256: bdd3d4fef1f722805d8b07e16fd3507737cd4afd0ab7f5592c9f23405a6fc5cf |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ipa-client-2.1.3-4.el5.src.rpm | SHA-256: e729998d5c9eee55b91d144da5a62a62e5c862405893f589230dd7299c7a366d |
ppc | |
ipa-client-2.1.3-4.el5.ppc.rpm | SHA-256: 1e7f39a2150731fc5ac0c106c92960e26fc0027819991861db1439d4de5eb781 |
ipa-client-debuginfo-2.1.3-4.el5.ppc.rpm | SHA-256: de7156192ca10cfd3c86d8705d589c7e90d50663be7a06da676aac2ba52680ba |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ipa-client-2.1.3-4.el5.src.rpm | SHA-256: e729998d5c9eee55b91d144da5a62a62e5c862405893f589230dd7299c7a366d |
x86_64 | |
ipa-client-2.1.3-4.el5.x86_64.rpm | SHA-256: f5bfa05d5053872c0eab8e9e2f77578edcc9593056e27c6d1628e767f9d7a42e |
ipa-client-debuginfo-2.1.3-4.el5.x86_64.rpm | SHA-256: 72c049b894cf4f88664dd93096b8ee38e623bbf040de527115e4e488450b031a |
i386 | |
ipa-client-2.1.3-4.el5.i386.rpm | SHA-256: 093fac5588233a6e7607f7b8bdc1dfcca4196c9c6b9462f2990aba9b24f816cf |
ipa-client-debuginfo-2.1.3-4.el5.i386.rpm | SHA-256: 3da13fb2ae79ce77e4c4013ac4091cb9fcd6aec53e32b9c9294f9b6d682711b3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.