Updated nss_ldap packages that fix a bug are now available for Red HatEnterprise Linux 5.

The nss_ldap packages contain the nss_ldap and pam_ldap modules. The nss_ldapmodule is a name service switch module, which allows applications to retrieveinformation about users and groups from a directory server. The pam_ldap moduleallows a directory server to be used by PAM-aware applications to verify userpasswords.This update fixes the following bug:* Prior to this update, the nss_ldap utility did not fail over properly oncertain SSL-enabled LDAP server implementations. This caused the queriesprocessed by the original LDAP server to be aborted and not resumed on analternate LDAP server. The nss_ldap failover capabilities have been updated toprevent this problem from occurring. (BZ#1035945)All users of nss_ldap are advised to upgrade to these updated packages, whichfix this bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nss_ldap-253-52.el5_11.2.src.rpm
    MD5: 54ba734bc989a97875755b056b9d5037SHA-256: e9967f6685944656687efd768f3b47792ef99604ce5bcf739a5639eada53589b
 
IA-32:
nss_ldap-253-52.el5_11.2.i386.rpm
    MD5: 479138e7fd688a9821812704c2fd4f52SHA-256: 3a988ad98a87dbf8347bb98ab723c258f067b633eac9e253011ddccd50d432c0
nss_ldap-debuginfo-253-52.el5_11.2.i386.rpm
    MD5: c288fbe1e8b240662e5db0f459283661SHA-256: 92e3fd0124e5e4bad822bc2e835f9c067a7943a13faa78d5a7478e4359779259
 
IA-64:
nss_ldap-253-52.el5_11.2.i386.rpm
    MD5: 479138e7fd688a9821812704c2fd4f52SHA-256: 3a988ad98a87dbf8347bb98ab723c258f067b633eac9e253011ddccd50d432c0
nss_ldap-253-52.el5_11.2.ia64.rpm
    MD5: c53fa07aef0dabe3d28a5f841d7b887fSHA-256: 1dac5a6d6ecaea810b5595042c8235bd233aadca7f4bb9eefde8b033a4900748
nss_ldap-debuginfo-253-52.el5_11.2.i386.rpm
    MD5: c288fbe1e8b240662e5db0f459283661SHA-256: 92e3fd0124e5e4bad822bc2e835f9c067a7943a13faa78d5a7478e4359779259
nss_ldap-debuginfo-253-52.el5_11.2.ia64.rpm
    MD5: 2baef76c1bd732d33adaf2c6d736440dSHA-256: 7ef6cf749fa716e377162a698c4c5991ad421a40650ffaeb3be8c25573c78be8
 
PPC:
nss_ldap-253-52.el5_11.2.ppc.rpm
    MD5: 7d5a4c6489dc5413216cb64a10507eddSHA-256: 8ee779ed9aa5b611649f020182fb80a41e73f8e797b29555887f0acffbf38996
nss_ldap-253-52.el5_11.2.ppc64.rpm
    MD5: 8fee078d2570dfdf24f0e9befe6f4186SHA-256: d7705cd08df043ad2153d96f1eff491d8fb5b6e912f228c1eacc37501f6de068
nss_ldap-debuginfo-253-52.el5_11.2.ppc.rpm
    MD5: 4b86094c68375b1f35669a730c576fbaSHA-256: 2883d3ac40e81946c72d13974b0b82587e7f43e482d887d52c3f734717ce82c9
nss_ldap-debuginfo-253-52.el5_11.2.ppc64.rpm
    MD5: 2148c9c66ed414bc8cf24cfb1357ab39SHA-256: 88e0f6426058435c9968b8d3bda7fa72fd66d137c61b477dfb8c07c07325f124
 
s390x:
nss_ldap-253-52.el5_11.2.s390.rpm
    MD5: 9a16ea2a7e85c1b97f6754a815cb7ac6SHA-256: 21be1f21e5bcc154fca8b43a70b48bd3117f0f51e8098e7a8c74c2428fbcc2f9
nss_ldap-253-52.el5_11.2.s390x.rpm
    MD5: 887af9d33ee9b148be4e989d8967164eSHA-256: 755e1abb027e263635ed220ba4af7ef9d402e236d849db56360531c0485b006a
nss_ldap-debuginfo-253-52.el5_11.2.s390.rpm
    MD5: 171f9ec95b0033bd53aa4d56540c7bf7SHA-256: c98a365e7d37a3d1d4679cb6969e8c9b9b92db6b60727201c0d840ebba4460ba
nss_ldap-debuginfo-253-52.el5_11.2.s390x.rpm
    MD5: 4e4d241ced88e19075ec26075333a877SHA-256: 1e61d9d362d0a784237381939c9b10acad4bfeb31deaa27b97da0cbbf10013e1
 
x86_64:
nss_ldap-253-52.el5_11.2.i386.rpm
    MD5: 479138e7fd688a9821812704c2fd4f52SHA-256: 3a988ad98a87dbf8347bb98ab723c258f067b633eac9e253011ddccd50d432c0
nss_ldap-253-52.el5_11.2.x86_64.rpm
    MD5: 5b555c963498169a78fb920c1a16b376SHA-256: e978c65a3a58158bd405b8dcff3b260dda18739827b56fbc37e9484513b9d399
nss_ldap-debuginfo-253-52.el5_11.2.i386.rpm
    MD5: c288fbe1e8b240662e5db0f459283661SHA-256: 92e3fd0124e5e4bad822bc2e835f9c067a7943a13faa78d5a7478e4359779259
nss_ldap-debuginfo-253-52.el5_11.2.x86_64.rpm
    MD5: c9a3683d1c243f44de5a10099686fde1SHA-256: 2211f8060fff343cd5317cf936cd4cfc8c12ceae497f900fea255f9b0e2bf0e4
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
nss_ldap-253-52.el5_11.2.src.rpm
    MD5: 54ba734bc989a97875755b056b9d5037SHA-256: e9967f6685944656687efd768f3b47792ef99604ce5bcf739a5639eada53589b
 
IA-32:
nss_ldap-253-52.el5_11.2.i386.rpm
    MD5: 479138e7fd688a9821812704c2fd4f52SHA-256: 3a988ad98a87dbf8347bb98ab723c258f067b633eac9e253011ddccd50d432c0
nss_ldap-debuginfo-253-52.el5_11.2.i386.rpm
    MD5: c288fbe1e8b240662e5db0f459283661SHA-256: 92e3fd0124e5e4bad822bc2e835f9c067a7943a13faa78d5a7478e4359779259
 
x86_64:
nss_ldap-253-52.el5_11.2.i386.rpm
    MD5: 479138e7fd688a9821812704c2fd4f52SHA-256: 3a988ad98a87dbf8347bb98ab723c258f067b633eac9e253011ddccd50d432c0
nss_ldap-253-52.el5_11.2.x86_64.rpm
    MD5: 5b555c963498169a78fb920c1a16b376SHA-256: e978c65a3a58158bd405b8dcff3b260dda18739827b56fbc37e9484513b9d399
nss_ldap-debuginfo-253-52.el5_11.2.i386.rpm
    MD5: c288fbe1e8b240662e5db0f459283661SHA-256: 92e3fd0124e5e4bad822bc2e835f9c067a7943a13faa78d5a7478e4359779259
nss_ldap-debuginfo-253-52.el5_11.2.x86_64.rpm
    MD5: c9a3683d1c243f44de5a10099686fde1SHA-256: 2211f8060fff343cd5317cf936cd4cfc8c12ceae497f900fea255f9b0e2bf0e4
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply