- Issued:
- 2007-11-07
- Updated:
- 2007-11-07
RHBA-2007:0651 - Bug Fix Advisory
Synopsis
nfs-utils bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated nfs-utils packages that fix various bugs and add an enhancement
are now available.
Description
The nfs-utils package provides a daemon for the kernel Network File
System (NFS) server and related tools, providing a much higher level of
performance than the traditional Linux NFS server used by most users.
These updated packages fix the following bugs:
- when a Red Hat Enterprise Linux 4 NFS server directory was mounted,
mountd added entries to /var/lib/nfs/rmtab incorrectly. Running "showmount
- a" displayed mount-point entries containing hex addresses and the "*"
character. Mount points were not removed upon unmounting. mountd now stores
IP addresses rather than hostnames in rmtab. These latter can be resolved
with the new "mountd -r" option, which can be set with the 'echo
'RPCMOUNTDOPTS="-r"' >> /etc/sysconfig/nfs' command.
- "showmount -a" did not display Fully Qualified Domain Names (FQDN).
- the "mount -f" command did not update /etc/mtab.
- mounting an NFSv4 file system which did not exist resulted in a "mount
point '/mnt/directory' does not exist" error, where '/mnt/directory' is
the specified local mount point. A "No such file or directory" error is now
returned.
- a memory leak in nfs-utils causing mountd to consume a large amount
of memory on heavily utilized NFS servers has been fixed.
- nfsd started successfully even when 'RPCNFSDARGS="-T"' was configured in
"/etc/sysconfig/nfs". nfsd should fail to start as version 4 requires
TCP/IP.
- mount.nfs failed to lock "/etc/mtab" correctly.
- immediately running exportfs after restarting an NFS server could
result in inconsistencies between exportfs and the "showmount -e" command.
For example, exportfs would export a directory but showmount would not
display it.
- multiple NFS mounts of the same file system type (ie ext3) inherited the
options from the parent. For example, mounting an ext3 NFS share read-only
resulted in all other subsequent ext3 NFS shares being mounted read-only,
regardless of the mount options specified. This behavior was also apparent
in the anaconda pre-install environment.
- secure autofs NFS mounted shares failed to cleanly unmount during system
shutdown, causing numerous errors such as the following:
kernel: RPC: AUTH_GSS upcall timed out.
kernel: Please check user daemon is running!
These shares are cleanly unmounted in these updated packages.
- The "In releases of nfs-utils upto and including 1.0.0, this option was
the default..." section in the sync section of the exportfs man page has
been moved to the correct async section.
- mount.nfs allocates a socket and binds it to a reserved port, and then
passes it to the kernel which creates its own socket. On heavily utilized
NFS servers this lead to port exhaustion.
- the "service nfs status" command always had a zero (success) exit code.
- the rpcgssd, rpcidmapd, and rpcsvcgssd init scripts returned incorrect
exit codes.
- a script bug which caused a delay in shutting down an NFS server
using "service nfs shutdown" has been resolved.
- the rpc.statd daemon ran as root. The rpc.statd daemon is run as
the rpcuser in these updated packages.
- upgrading from nfs-utils-1.0.10-7.fc6.x86_64 to
nfs-utils-1.0.10-10.fc6.x86_64 when nfs is not running resulted in a
"error: %postun(nfs-utils-1.0.10-7.fc6.x86_64) scriptlet failed, exit
status 1" error.
- mount.nfs caused numerous errors and failed to mount NFS shares on 64-bit
architectures.
This update also adds the following enhancements:
- the userspace portion of NFSv4 relocation support was added.
- NFS ports were set dynamically by portmapper. Ports can statically be
configured in "/etc/sysconfig/nfs" in these updated packages.
All nfs-utils users are advised to upgrade to these updated packages,
which resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 233903 - Incorrect description for sync in man page exports(5)
- BZ - 234543 - RFE: Set static ports for NFS
- BZ - 236823 - exportfs gives inconsistent results when run immediately after nfs service is restarted
- BZ - 239536 - Memory leak was found in nfs-utils
- BZ - 240352 - nfs-utils postuninstall scriptlet failure on upgrade
- BZ - 241015 - idmapd startup script fails when sunrpc is statically linked
- BZ - 241190 - mount.nfs errors out in nfs-utils -19.el5 on x86_64
- BZ - 243703 - Wrong init script
- BZ - 243913 - NFS Client R/O in anaconda preinstall environment
- BZ - 245376 - Errors on shutdown with kerberos NFS filesystems mounted
- BZ - 246254 - mount.nfs unnecessarily passes a socket to the kernel
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
nfs-utils-1.0.9-24.el5.src.rpm | SHA-256: 7360230b9f95f71d1c08a25e20258fd54d4fcf86500396754d7ee53568d84d3d |
x86_64 | |
nfs-utils-1.0.9-24.el5.x86_64.rpm | SHA-256: e58684710f8328f9e2fee277ca8fbe087ef6851e041ad3a62963e3ba8c405427 |
ia64 | |
nfs-utils-1.0.9-24.el5.ia64.rpm | SHA-256: a8fde777a7c7ec58e7e6031bd2f7962d4b2b4f91599d428453938a8b25d3c19b |
i386 | |
nfs-utils-1.0.9-24.el5.i386.rpm | SHA-256: 23b0b2ff9853da41d0a132557bd8b778e23926ddb23027f2a80495ad95f49b3b |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
nfs-utils-1.0.9-24.el5.src.rpm | SHA-256: 7360230b9f95f71d1c08a25e20258fd54d4fcf86500396754d7ee53568d84d3d |
x86_64 | |
nfs-utils-1.0.9-24.el5.x86_64.rpm | SHA-256: e58684710f8328f9e2fee277ca8fbe087ef6851e041ad3a62963e3ba8c405427 |
i386 | |
nfs-utils-1.0.9-24.el5.i386.rpm | SHA-256: 23b0b2ff9853da41d0a132557bd8b778e23926ddb23027f2a80495ad95f49b3b |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
nfs-utils-1.0.9-24.el5.src.rpm | SHA-256: 7360230b9f95f71d1c08a25e20258fd54d4fcf86500396754d7ee53568d84d3d |
x86_64 | |
nfs-utils-1.0.9-24.el5.x86_64.rpm | SHA-256: e58684710f8328f9e2fee277ca8fbe087ef6851e041ad3a62963e3ba8c405427 |
i386 | |
nfs-utils-1.0.9-24.el5.i386.rpm | SHA-256: 23b0b2ff9853da41d0a132557bd8b778e23926ddb23027f2a80495ad95f49b3b |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
nfs-utils-1.0.9-24.el5.src.rpm | SHA-256: 7360230b9f95f71d1c08a25e20258fd54d4fcf86500396754d7ee53568d84d3d |
s390x | |
nfs-utils-1.0.9-24.el5.s390x.rpm | SHA-256: 5eb5ac79cbd8d7f067a58a8f24ef477dc63113bd5bcd0c6998743fc42afe4822 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
nfs-utils-1.0.9-24.el5.src.rpm | SHA-256: 7360230b9f95f71d1c08a25e20258fd54d4fcf86500396754d7ee53568d84d3d |
ppc | |
nfs-utils-1.0.9-24.el5.ppc.rpm | SHA-256: a76489056eabc881cfca5c733383d863f0662076096662d6989d3b50aa6531db |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
nfs-utils-1.0.9-24.el5.src.rpm | SHA-256: 7360230b9f95f71d1c08a25e20258fd54d4fcf86500396754d7ee53568d84d3d |
x86_64 | |
nfs-utils-1.0.9-24.el5.x86_64.rpm | SHA-256: e58684710f8328f9e2fee277ca8fbe087ef6851e041ad3a62963e3ba8c405427 |
i386 | |
nfs-utils-1.0.9-24.el5.i386.rpm | SHA-256: 23b0b2ff9853da41d0a132557bd8b778e23926ddb23027f2a80495ad95f49b3b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.