Subject: [RHBA-2001:040-03] Updated Kerberos 5 packages available From: bugzilla@redhat.com To: redhat-watch-list@redhat.com Date: Fri, 30 Mar 2001 16:01 -0500 --------------------------------------------------------------------- Red Hat, Inc. Red Hat Bug Fix Advisory Synopsis: Updated Kerberos 5 packages available Advisory ID: RHBA-2001:040-03 Issue date: 2001-03-30 Updated on: 2001-03-30 Product: Red Hat Linux Keywords: libkrb5 stat Cross references: RHSA-2001:025 Obsoletes: --------------------------------------------------------------------- 1. Topic: Updated Kerberos 5 packages are now available for Red Hat Linux 7. These updates resolve a linkage problem introduced in RHSA-2001:025. 2. Relevant releases/architectures: Red Hat Linux 7.0 - alpha, i386 3. Problem description: Shared libraries which use the stat, fstat, lstat, or mknod functions provided by libc, and which are compiled without optimization enabled, will include copies of those functions instead of references to the __stat, __fstat, __lstat, and __mknod functions provided by libc. When a binary is compiled using these shared libraries, the linker will resolve references in such a way that the binary will require these symbols to be present at run-time. If these symbols are not present, a binary which requires them will fail unexpectedly when it tries to call the function. The previously-issued Kerberos 5 errata packages were built with optimization enabled, and triggered this problem in a number of packages which are linked against the libkrb5 shared library. These updates ensure compatibility with the libraries originally shipped with Red Hat Linux 7 by forcing the inclusion of these symbols, regardless of how the libkrb5 shared library is built. 4. Solution: To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 33580 - LPRng does not work after krb5 update 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/krb5-1.2.2-4.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os/alpha/krb5-devel-1.2.2-4.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/krb5-libs-1.2.2-4.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/krb5-server-1.2.2-4.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/krb5-workstation-1.2.2-4.alpha.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/krb5-devel-1.2.2-4.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/krb5-libs-1.2.2-4.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/krb5-server-1.2.2-4.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/krb5-workstation-1.2.2-4.i386.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- cebb7f6faf67e542d198edaae90fce11 7.0/en/os/SRPMS/krb5-1.2.2-4.src.rpm 980289417c6e6cc59f4f5a10504c8452 7.0/en/os/alpha/krb5-devel-1.2.2-4.alpha.rpm 68ccdb0f41a493f1f6e2a0a051fb8600 7.0/en/os/alpha/krb5-libs-1.2.2-4.alpha.rpm 1098dc4b93a34ce53093dc9c11b91d13 7.0/en/os/alpha/krb5-server-1.2.2-4.alpha.rpm 8ebe14089bb648435b0a574f7fe07a85 7.0/en/os/alpha/krb5-workstation-1.2.2-4.alpha.rpm af0bb7a24feb994c56c9a0d66b57ffa3 7.0/en/os/i386/krb5-devel-1.2.2-4.i386.rpm e00f978fcbdb634878905820dde832bb 7.0/en/os/i386/krb5-libs-1.2.2-4.i386.rpm 75e2354744748523b963c0da9bf3680f 7.0/en/os/i386/krb5-server-1.2.2-4.i386.rpm 1bed3bcd4b02004a7883b5d2d2cbc23d 7.0/en/os/i386/krb5-workstation-1.2.2-4.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Copyright(c) 2000, 2001 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list