- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0107 - Bug Fix Advisory
Synopsis
nfs-utils bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated nfs-utils package that fixes several bugs and adds various
enhancements is now available.
Description
The nfs-utils package provides both server and client system daemons as
well other related tools for the Network File System (NFS).
This updated nfs-utils package provides fixes for the following bugs:
- nfsstat no longer displays statistics about "versions of NFS that have
non-zero counts".
- kernel callbacks now work correctly when the '-n' command line switch is
used with rpc.stated.
- the command "netstat -s" no longer improperly shows negative numbers in
its output.
- rpc.gssd now uses file ownership to determine security credentials.
- command line arguments are now properly passed to rpc.nfsd by the NFS
init script.
- backgrounded NFS mounts now function as expected.
- the command "nfsstat -s" displayed negative values in its output after
the nfsd ran for a long time continuously with many clients performing
operations due to a signed integer overflow error.
- this updated package fixes a typo in the argument process of the
"--mounted" flag of the nfsstat command.
In addition, this updated package provides the following enhancements:
- the maximum number of simultaneous secure NFS mounts has been increased.
- the nfs-utils init scripts have been fixed so that they are now compliant
with Linux Standard Base (LSB) guidelines.
Also note that FS-Cache has been removed from Red Hat Enterprise Linux
5.3. Red Hat is now focusing its implementation on upstream efforts and,
once successful upstream integration has been achieved, we will review the
design for inclusion in a future Red Hat Enterprise Linux release based on
invasiveness and compatibility assessments.
Due to these developments in regard to FS-Cache, Red Hat does not encourage
the use of the Technology Preview in Red Hat Enterprise Linux 5.2. Red Hat
will be focusing on further refining this feature as per upstream
specifications.
Users are advised to upgrade to this updated nfs-utils package, which
resolves these issues and adds these enhancements.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 431891 - Incorrect exit codes from nfs init script
- BZ - 432879 - Cannot mount over 24 krb5 mounts
- BZ - 433741 - execute command "nfsstat --mounted" cann't print information of the mounted NFS file systems
- BZ - 433751 - rpc.gssd looks at file names rather than file ownership
- BZ - 437242 - nfsstat displays information about NFSv4 when it should not
- BZ - 438418 - Backgrounded NFS mounts not working
- BZ - 440057 - "nfsstat -s" shows negative value
- BZ - 441983 - nfs server does not correctly set parameters on first startup
- BZ - 451057 - [RHEL 5] lockd not aware of statd -n switch
- BZ - 465966 - mount.nfs returns incorrect exit code for failed mount
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
nfs-utils-1.0.9-40.el5.src.rpm | SHA-256: 213db3cb567fd90991c815626d8382ded1168bbca1fbfc40d4eb1637a4d88054 |
x86_64 | |
nfs-utils-1.0.9-40.el5.x86_64.rpm | SHA-256: aead6ba0691dc37207befb583064782fe0d4d6f98d7396f6eaed3e2b3d9c05e2 |
ia64 | |
nfs-utils-1.0.9-40.el5.ia64.rpm | SHA-256: fe91f48a2c5429fa1c98c9211407f47169149cf22990f648bd208259e8d16bf5 |
i386 | |
nfs-utils-1.0.9-40.el5.i386.rpm | SHA-256: 84a3556a7707f6399ae580fe990f4e9254090e5f0904da0c45b50b341e49851a |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
nfs-utils-1.0.9-40.el5.src.rpm | SHA-256: 213db3cb567fd90991c815626d8382ded1168bbca1fbfc40d4eb1637a4d88054 |
x86_64 | |
nfs-utils-1.0.9-40.el5.x86_64.rpm | SHA-256: aead6ba0691dc37207befb583064782fe0d4d6f98d7396f6eaed3e2b3d9c05e2 |
i386 | |
nfs-utils-1.0.9-40.el5.i386.rpm | SHA-256: 84a3556a7707f6399ae580fe990f4e9254090e5f0904da0c45b50b341e49851a |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
nfs-utils-1.0.9-40.el5.src.rpm | SHA-256: 213db3cb567fd90991c815626d8382ded1168bbca1fbfc40d4eb1637a4d88054 |
x86_64 | |
nfs-utils-1.0.9-40.el5.x86_64.rpm | SHA-256: aead6ba0691dc37207befb583064782fe0d4d6f98d7396f6eaed3e2b3d9c05e2 |
i386 | |
nfs-utils-1.0.9-40.el5.i386.rpm | SHA-256: 84a3556a7707f6399ae580fe990f4e9254090e5f0904da0c45b50b341e49851a |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
nfs-utils-1.0.9-40.el5.src.rpm | SHA-256: 213db3cb567fd90991c815626d8382ded1168bbca1fbfc40d4eb1637a4d88054 |
s390x | |
nfs-utils-1.0.9-40.el5.s390x.rpm | SHA-256: e42caf5307e144a4ec19098bcc4f7c8a7e0f71ce1ce6bcabe2ff56803356b85e |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
nfs-utils-1.0.9-40.el5.src.rpm | SHA-256: 213db3cb567fd90991c815626d8382ded1168bbca1fbfc40d4eb1637a4d88054 |
ppc | |
nfs-utils-1.0.9-40.el5.ppc.rpm | SHA-256: 89009cf3a0a953b8f71a746ea05f238f462f72924c21a58c7fa39c51f9368c87 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
nfs-utils-1.0.9-40.el5.src.rpm | SHA-256: 213db3cb567fd90991c815626d8382ded1168bbca1fbfc40d4eb1637a4d88054 |
x86_64 | |
nfs-utils-1.0.9-40.el5.x86_64.rpm | SHA-256: aead6ba0691dc37207befb583064782fe0d4d6f98d7396f6eaed3e2b3d9c05e2 |
i386 | |
nfs-utils-1.0.9-40.el5.i386.rpm | SHA-256: 84a3556a7707f6399ae580fe990f4e9254090e5f0904da0c45b50b341e49851a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.