OBSOLETE Patch-ID# 113319-19


Download this patch from My Oracle Support

Your use of the firmware, software and any other materials contained in this update is subject to My Oracle Support Terms of Use, which may be viewed at My Oracle Support.
For further information on patching best practices and resources, please see the following links:
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.

Keywords: security xdr_array overflow nis+ udp rpc crypt plugin hash nispasswdd
Synopsis: Obsoleted by: 113319-20 SunOS 5.9: libnsl nispasswdd patch
Date: Aug/13/2004


Install Requirements: After installing this patch on an active boot environment, the system will be in a potentially inconsistent state until a reboot is performed. Unless
otherwise specified in the Special Install Instructions below, it is normally safe to apply further patches prior to initiating the reboot due to the relatively small footprint of the patch utilities. Normal operations must not be resumed until after the reboot is performed.
Use Single User Mode (run level S) when installing this patch on an active boot environment. An alternative may be specified in the Special Install Instructions.

Solaris Release: 9

SunOS Release: 5.9

Unbundled Product:

Unbundled Release:

Xref: This patch available for x86 as patch 113719

Topic: SunOS 5.9: libnsl nispasswdd patch

Relevant Architectures: sparc

Bugs fixed with this patch:

Sun CR # Bug #
122616614906142
415287614965391
415658014966341
419282414976333
424843014991642
435383615032080
439005315044908
451700315083953
464808515099269
466869915104390
468069115106795
468455815107585
469077515109140
469112715109215
470060215111319
471092815114004
472772615118150
473885215121270
474590915123360
475361015125674
475611315126396
475738715126822
476550615129205
476727615129811
477296015131733
481783315146168
482533415148585
482827115149381
491505315174948
496652615188959
497353615190884
497797815192040


Changes incorporated in this version: 4966526

Patches accumulated and obsoleted by this patch: 113481-03

Patches which conflict with this patch:

Patches required with this patch: 112874-16 (or greater)

Obsoleted by:

Files included with this patch:

/usr/include/rpcsvc/nislib.h
/usr/lib/libnsl.a
/usr/lib/libnsl.so.1
/usr/lib/llib-lnsl
/usr/lib/llib-lnsl.ln
/usr/lib/sparcv9/libnsl.so.1
/usr/lib/sparcv9/llib-lnsl.ln
/usr/sbin/rpc.nisd
/usr/sbin/rpc.nispasswdd

Problem Description:

4966526 Problem using RPC_SVC_CONNMAXREC_SET when using the rpc mode RPC_SVC_MT_USER
 
(from 113319-18)
 
4817833 mountd randomly dumps core
4745909 _get_hostserv_inetnetdir_byname/NETDIR_BY may return success on failure
4915053 nss_setent() always fails for setpwent()
4973536 libnsl - t_getprotaddr memory leak
4977978 Application deadlock in t_snd (libnsl) library call
 
(from 113319-17)
 
4738852 NIS: ypserv dev udp opened failed
 
(from 113319-16)
 
4757387 Several daemons die with same stack trace strlen/xdr_nis_name/xdr_directory_obj
 
(from 113319-15)
 
4684558 NIS server doesn't answer ypbind broadcast request on IPMP failed over interface
 
(from 113319-14)
 
4765506 NIS+ password problems with Solaris 9
 
(from 113319-13)
 
4828271 clnt_create()/clnt_create_timed() don't timeout with unexpected UDP.
 
(from 113319-12)
 
4353836 if more than 255 file descriptors are already open then gethostbyname fails
4152876 getspnam_r() fails due to use of fopen() in libnsl.so in applications under load
4156580 getnetlist uses fopen, limiting RPC to 256 descriptors
 
(from 113319-11)
 
4767276 rpcbind can be killed remotely
 
(from 113319-10)
 
4668699 buffer overflow in dbm_open and dbminit (except the one in libc)
 
(from 113319-09)
 
4825334	113319-06+ needs a dependency on 112874-07+
 
(from 113319-08)
 
The bug fix for this revision was excluded due to the bug 4825334
 
(from 113319-07)
 
4710928 rpcbind exits with segv on both cluster node
 
(from 113319-06)
 
4727726 NIS+ user unable to change his/her passwd.
 
(from 113319-05)
 
4772960	Several patches have pkginfo and patchinfo files that fail consistency checking
 
(from 113319-04)
 
4680691 doctored rpc calls over UDP can bring down machines through rpcbind
 
(from 113319-03)
 
1226166 rpcbind does not bind with the correct network interface
4690775 nisplus_ldap_udt: rpcbind got killed and core dump during nisplus server setup
 
(from 113319-02)
 
4517003 ypserv spinning after client disconnects
4648085 automountd dumps core freeing an illegal address in __svc_dupcache_victim()
 
(from 113319-01)
 
4691127 Possible type overflow in xdr_array
 
(from 113481-03)
 
4753610 rpc.nispasswdd::nis_object2passwd() makes rpc.nispasswdd dump core
 
(from 113481-02)
 
4756113 libc version number is incorrect in s9u2
 
(from 113481-01)
 
4390053 crypt(3c) needs to interoperate with *BSD and Linux
4248430 RFE: NIS+ should support alternate encryption algorithms for the user password
4192824 newkey/chkey should use a configurable crypt() to encrypt the users password
4700602 crypt_gensalt should be version SUNW_1.22 instead of SUNW_1.21


Patch Installation Instructions:
--------------------------------
 
For Solaris 2.0-2.6 releases, refer to the Install.info file and/or
the README within the patch for instructions on using the generic
'installpatch' and 'backoutpatch' scripts provided with each patch.
 
For Solaris 7-9 releases, refer to the man pages for instructions
on using 'patchadd' and 'patchrm' scripts provided with Solaris.
Any other special or non-generic installation instructions should be
described below as special instructions.  The following example
installs a patch to a standalone machine:
 
       example# patchadd /var/spool/patch/104945-02
 
The following example removes a patch from a standalone system:
 
       example# patchrm 104945-02
 
For additional examples please see the appropriate man pages.


Special Install Instructions:
-----------------------------
 
In order for this patch to take effect, your system must be rebooted
immediately after the patch has been installed.
 
NOTE 1: To get the complete Flexible Crypt feature, please install the
        following patches:
 
        112874-06       (or newer)      libc
        113475-01       (or newer)      libsecurity crypt
        113476-01       (or newer)      passwdutil.so.1
        113480-01       (or newer)      pam_unix Patch
        113482-01       (or newer)      sbin/sulogin
        113483-01       (or newer)      rpc.ypasswdd
 
NOTE 2: The fix for bug# 4680691 uncovered a bug (4775198) in the SUNWjbcp
	package.  A patch for this bug has been released as 114153-01.  This
	patch or a later revision of it has to be installed if you use the
	SUNWjbcp package.
 
NOTE 3: To get the complete fix for bugids 1226166 and 4690775, patch
        113330-01 must also be installed on your system.
 
NOTE 4: To get the complete fix for the bugid 4353836, please install
        the following patches, in addition to this patch:
 
        112874-16 (or newer) libc patch (must be the 1st patch to be
        installed)
        112970-05 (or newer) libresolv patch
        115545-01 (or newer) nss_files patch
        115542-01 (or newer) nss_user patch
        115544-01 (or newer) nss_compat patch
 
NOTE 5: To get the complete fix for the bugid 4828271, please install
        the following patch, in addition to this patch:
 
        112874-16 (or newer) libc patch (must be the 1st patch to be
        installed)
 
NOTE 6: To get the complete fix for the bugid 4765506, please install
        the following patch, in addition to this patch:
 
        113476-08 (or newer) passwdutil.so.1 patch
 
NOTE 7: To get the complete fix for bug 4915053 please install the
   	following patch:
 
   	112874-25 (or newer) libc Patch


README -- Last modified date: Friday, November 9, 2012