OBSOLETE Patch-ID# 113319-19
Download this patch from My Oracle Support
Your use of the firmware, software and any other materials contained
in this update is subject to My Oracle Support Terms of Use, which
may be viewed at My Oracle Support.
|
For further information on patching best practices and resources, please
see the following links:
|
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
|
Keywords: security xdr_array overflow nis+ udp rpc crypt plugin hash nispasswdd
Synopsis: Obsoleted by: 113319-20 SunOS 5.9: libnsl nispasswdd patch
Date: Aug/13/2004
Install Requirements: After installing this patch on an active boot environment, the system will be in a potentially inconsistent state until a reboot is performed. Unless
otherwise specified in the Special Install Instructions below, it is normally safe to apply further patches prior to initiating the reboot due to the relatively small footprint of the patch utilities. Normal operations must not be resumed until after the reboot is performed.
Use Single User Mode (run level S) when installing this patch on an active boot environment. An alternative may be specified in the Special Install Instructions.
Solaris Release: 9
SunOS Release: 5.9
Unbundled Product:
Unbundled Release:
Xref: This patch available for x86 as patch 113719
Topic: SunOS 5.9: libnsl nispasswdd patch
Relevant Architectures: sparc
Bugs fixed with this patch:
Changes incorporated in this version: 4966526
Patches accumulated and obsoleted by this patch: 113481-03
Patches which conflict with this patch:
Patches required with this patch: 112874-16 (or greater)
Obsoleted by:
Files included with this patch:
/usr/include/rpcsvc/nislib.h
/usr/lib/libnsl.a
/usr/lib/libnsl.so.1
/usr/lib/llib-lnsl
/usr/lib/llib-lnsl.ln
/usr/lib/sparcv9/libnsl.so.1
/usr/lib/sparcv9/llib-lnsl.ln
/usr/sbin/rpc.nisd
/usr/sbin/rpc.nispasswdd
Problem Description:
4966526 Problem using RPC_SVC_CONNMAXREC_SET when using the rpc mode RPC_SVC_MT_USER
(from 113319-18)
4817833 mountd randomly dumps core
4745909 _get_hostserv_inetnetdir_byname/NETDIR_BY may return success on failure
4915053 nss_setent() always fails for setpwent()
4973536 libnsl - t_getprotaddr memory leak
4977978 Application deadlock in t_snd (libnsl) library call
(from 113319-17)
4738852 NIS: ypserv dev udp opened failed
(from 113319-16)
4757387 Several daemons die with same stack trace strlen/xdr_nis_name/xdr_directory_obj
(from 113319-15)
4684558 NIS server doesn't answer ypbind broadcast request on IPMP failed over interface
(from 113319-14)
4765506 NIS+ password problems with Solaris 9
(from 113319-13)
4828271 clnt_create()/clnt_create_timed() don't timeout with unexpected UDP.
(from 113319-12)
4353836 if more than 255 file descriptors are already open then gethostbyname fails
4152876 getspnam_r() fails due to use of fopen() in libnsl.so in applications under load
4156580 getnetlist uses fopen, limiting RPC to 256 descriptors
(from 113319-11)
4767276 rpcbind can be killed remotely
(from 113319-10)
4668699 buffer overflow in dbm_open and dbminit (except the one in libc)
(from 113319-09)
4825334 113319-06+ needs a dependency on 112874-07+
(from 113319-08)
The bug fix for this revision was excluded due to the bug 4825334
(from 113319-07)
4710928 rpcbind exits with segv on both cluster node
(from 113319-06)
4727726 NIS+ user unable to change his/her passwd.
(from 113319-05)
4772960 Several patches have pkginfo and patchinfo files that fail consistency checking
(from 113319-04)
4680691 doctored rpc calls over UDP can bring down machines through rpcbind
(from 113319-03)
1226166 rpcbind does not bind with the correct network interface
4690775 nisplus_ldap_udt: rpcbind got killed and core dump during nisplus server setup
(from 113319-02)
4517003 ypserv spinning after client disconnects
4648085 automountd dumps core freeing an illegal address in __svc_dupcache_victim()
(from 113319-01)
4691127 Possible type overflow in xdr_array
(from 113481-03)
4753610 rpc.nispasswdd::nis_object2passwd() makes rpc.nispasswdd dump core
(from 113481-02)
4756113 libc version number is incorrect in s9u2
(from 113481-01)
4390053 crypt(3c) needs to interoperate with *BSD and Linux
4248430 RFE: NIS+ should support alternate encryption algorithms for the user password
4192824 newkey/chkey should use a configurable crypt() to encrypt the users password
4700602 crypt_gensalt should be version SUNW_1.22 instead of SUNW_1.21
Patch Installation Instructions:
--------------------------------
For Solaris 2.0-2.6 releases, refer to the Install.info file and/or
the README within the patch for instructions on using the generic
'installpatch' and 'backoutpatch' scripts provided with each patch.
For Solaris 7-9 releases, refer to the man pages for instructions
on using 'patchadd' and 'patchrm' scripts provided with Solaris.
Any other special or non-generic installation instructions should be
described below as special instructions. The following example
installs a patch to a standalone machine:
example# patchadd /var/spool/patch/104945-02
The following example removes a patch from a standalone system:
example# patchrm 104945-02
For additional examples please see the appropriate man pages.
Special Install Instructions:
-----------------------------
In order for this patch to take effect, your system must be rebooted
immediately after the patch has been installed.
NOTE 1: To get the complete Flexible Crypt feature, please install the
following patches:
112874-06 (or newer) libc
113475-01 (or newer) libsecurity crypt
113476-01 (or newer) passwdutil.so.1
113480-01 (or newer) pam_unix Patch
113482-01 (or newer) sbin/sulogin
113483-01 (or newer) rpc.ypasswdd
NOTE 2: The fix for bug# 4680691 uncovered a bug (4775198) in the SUNWjbcp
package. A patch for this bug has been released as 114153-01. This
patch or a later revision of it has to be installed if you use the
SUNWjbcp package.
NOTE 3: To get the complete fix for bugids 1226166 and 4690775, patch
113330-01 must also be installed on your system.
NOTE 4: To get the complete fix for the bugid 4353836, please install
the following patches, in addition to this patch:
112874-16 (or newer) libc patch (must be the 1st patch to be
installed)
112970-05 (or newer) libresolv patch
115545-01 (or newer) nss_files patch
115542-01 (or newer) nss_user patch
115544-01 (or newer) nss_compat patch
NOTE 5: To get the complete fix for the bugid 4828271, please install
the following patch, in addition to this patch:
112874-16 (or newer) libc patch (must be the 1st patch to be
installed)
NOTE 6: To get the complete fix for the bugid 4765506, please install
the following patch, in addition to this patch:
113476-08 (or newer) passwdutil.so.1 patch
NOTE 7: To get the complete fix for bug 4915053 please install the
following patch:
112874-25 (or newer) libc Patch
README -- Last modified date: Friday, November 9, 2012