Skip to navigation

Bug Fix Advisory nfs-utils bug fix update

Advisory: RHBA-2011:1397-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-10-24
Last updated on: 2011-10-24
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.1.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated nfs-utils package that fixes one bug is now available for Red Hat
Enterprise Linux 6.

The nfs-utils package provides a daemon for the kernel Network File System (NFS)
server and related tools, which provides better performance than the traditional
Linux NFS server used by most users. This package also contains the mount.nfs,
umount.nfs, and showmount programs.

This update fixes the following bug:

* Previously, the function responsible for parsing the /proc/mounts file was not
able to handle single quote characters in the path name of a mount points
entries. As a consequence, an NFS exported file system could not be unmounted if
its mount point contained space characters. To fix this problem, the parsing
routine has been rewritten so that it now parses entries in the /proc/mounts
file properly. All NFS file systems now can be unmounted as expected.
(BZ#731309)

All users of nfs-utils are advised to upgrade to this updated package, which
fixes this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
nfs-utils-1.2.3-7.el6_1.1.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 4e781a760841ef892c34654aeab74665
SHA-256: 836c7d7c3563bcac09ad7babe72961547660c4a1250851cd9a15a698b77d5155
 
IA-32:
nfs-utils-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: f9c1eb2a0ea1ecaabc7d55028d59b3fc
SHA-256: 14914164dc460d5a09d4a894bb5d8f4a4add781657f7ee75f28f04ba17a06680
nfs-utils-debuginfo-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: bd8689331cf97334477381d6185eecd3
SHA-256: eeca5f8fb5af4762ee914797a863a07ec39f896b6453244aaff50cf50d5383ea
 
x86_64:
nfs-utils-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: d6acdc384324a6a7ea458e837130919c
SHA-256: 4f09262d99d3c12fa80a95e9ff4cde6e9b919e797461b8b166e0945e13793874
nfs-utils-debuginfo-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: ff8770aac0e8fedfa57a182210a9c364
SHA-256: a392beb5fbc993adef3f1479cb8e6111ce9d8025d994aca301b0ebf7ee7e02ee
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
nfs-utils-1.2.3-7.el6_1.1.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 4e781a760841ef892c34654aeab74665
SHA-256: 836c7d7c3563bcac09ad7babe72961547660c4a1250851cd9a15a698b77d5155
 
x86_64:
nfs-utils-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: d6acdc384324a6a7ea458e837130919c
SHA-256: 4f09262d99d3c12fa80a95e9ff4cde6e9b919e797461b8b166e0945e13793874
nfs-utils-debuginfo-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: ff8770aac0e8fedfa57a182210a9c364
SHA-256: a392beb5fbc993adef3f1479cb8e6111ce9d8025d994aca301b0ebf7ee7e02ee
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
nfs-utils-1.2.3-7.el6_1.1.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 4e781a760841ef892c34654aeab74665
SHA-256: 836c7d7c3563bcac09ad7babe72961547660c4a1250851cd9a15a698b77d5155
 
IA-32:
nfs-utils-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: f9c1eb2a0ea1ecaabc7d55028d59b3fc
SHA-256: 14914164dc460d5a09d4a894bb5d8f4a4add781657f7ee75f28f04ba17a06680
nfs-utils-debuginfo-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: bd8689331cf97334477381d6185eecd3
SHA-256: eeca5f8fb5af4762ee914797a863a07ec39f896b6453244aaff50cf50d5383ea
 
PPC:
nfs-utils-1.2.3-7.el6_1.1.ppc64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 7ee0d8394e565a9c4efbe6d8080713a0
SHA-256: 7cdb255db037d64565fe730fbd74779cd3c4e08ebd9034320b1c11d0add74179
nfs-utils-debuginfo-1.2.3-7.el6_1.1.ppc64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 3e4add12d15f4b11f25707c64e286730
SHA-256: b1d01efd0fa68e8946c978a8325fc1f75a11fb316a15d858f2efad8037ccb152
 
s390x:
nfs-utils-1.2.3-7.el6_1.1.s390x.rpm
File outdated by:  RHBA-2013:1714
    MD5: c8a7b97628fd90579442ecd3ec0e6245
SHA-256: af5c1ff6679ef12afb899ae1d13db4e2f0c2d332dc5803b1b166d6c6a5e60ce3
nfs-utils-debuginfo-1.2.3-7.el6_1.1.s390x.rpm
File outdated by:  RHBA-2013:1714
    MD5: 8d54e182fc4fae2cea161f8010418e6b
SHA-256: db43faca7bc0b6f188ba63279bfe93af5c4e737e6517ddd04c973af92a3a9941
 
x86_64:
nfs-utils-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: d6acdc384324a6a7ea458e837130919c
SHA-256: 4f09262d99d3c12fa80a95e9ff4cde6e9b919e797461b8b166e0945e13793874
nfs-utils-debuginfo-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: ff8770aac0e8fedfa57a182210a9c364
SHA-256: a392beb5fbc993adef3f1479cb8e6111ce9d8025d994aca301b0ebf7ee7e02ee
 
Red Hat Enterprise Linux Server EUS (v. 6.1.z)

SRPMS:
nfs-utils-1.2.3-7.el6_1.1.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 4e781a760841ef892c34654aeab74665
SHA-256: 836c7d7c3563bcac09ad7babe72961547660c4a1250851cd9a15a698b77d5155
 
IA-32:
nfs-utils-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2012:0671
    MD5: f9c1eb2a0ea1ecaabc7d55028d59b3fc
SHA-256: 14914164dc460d5a09d4a894bb5d8f4a4add781657f7ee75f28f04ba17a06680
nfs-utils-debuginfo-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2012:0671
    MD5: bd8689331cf97334477381d6185eecd3
SHA-256: eeca5f8fb5af4762ee914797a863a07ec39f896b6453244aaff50cf50d5383ea
 
PPC:
nfs-utils-1.2.3-7.el6_1.1.ppc64.rpm
File outdated by:  RHBA-2012:0671
    MD5: 7ee0d8394e565a9c4efbe6d8080713a0
SHA-256: 7cdb255db037d64565fe730fbd74779cd3c4e08ebd9034320b1c11d0add74179
nfs-utils-debuginfo-1.2.3-7.el6_1.1.ppc64.rpm
File outdated by:  RHBA-2012:0671
    MD5: 3e4add12d15f4b11f25707c64e286730
SHA-256: b1d01efd0fa68e8946c978a8325fc1f75a11fb316a15d858f2efad8037ccb152
 
s390x:
nfs-utils-1.2.3-7.el6_1.1.s390x.rpm
File outdated by:  RHBA-2012:0671
    MD5: c8a7b97628fd90579442ecd3ec0e6245
SHA-256: af5c1ff6679ef12afb899ae1d13db4e2f0c2d332dc5803b1b166d6c6a5e60ce3
nfs-utils-debuginfo-1.2.3-7.el6_1.1.s390x.rpm
File outdated by:  RHBA-2012:0671
    MD5: 8d54e182fc4fae2cea161f8010418e6b
SHA-256: db43faca7bc0b6f188ba63279bfe93af5c4e737e6517ddd04c973af92a3a9941
 
x86_64:
nfs-utils-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2012:0671
    MD5: d6acdc384324a6a7ea458e837130919c
SHA-256: 4f09262d99d3c12fa80a95e9ff4cde6e9b919e797461b8b166e0945e13793874
nfs-utils-debuginfo-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2012:0671
    MD5: ff8770aac0e8fedfa57a182210a9c364
SHA-256: a392beb5fbc993adef3f1479cb8e6111ce9d8025d994aca301b0ebf7ee7e02ee
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
nfs-utils-1.2.3-7.el6_1.1.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 4e781a760841ef892c34654aeab74665
SHA-256: 836c7d7c3563bcac09ad7babe72961547660c4a1250851cd9a15a698b77d5155
 
IA-32:
nfs-utils-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: f9c1eb2a0ea1ecaabc7d55028d59b3fc
SHA-256: 14914164dc460d5a09d4a894bb5d8f4a4add781657f7ee75f28f04ba17a06680
nfs-utils-debuginfo-1.2.3-7.el6_1.1.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: bd8689331cf97334477381d6185eecd3
SHA-256: eeca5f8fb5af4762ee914797a863a07ec39f896b6453244aaff50cf50d5383ea
 
x86_64:
nfs-utils-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: d6acdc384324a6a7ea458e837130919c
SHA-256: 4f09262d99d3c12fa80a95e9ff4cde6e9b919e797461b8b166e0945e13793874
nfs-utils-debuginfo-1.2.3-7.el6_1.1.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: ff8770aac0e8fedfa57a182210a9c364
SHA-256: a392beb5fbc993adef3f1479cb8e6111ce9d8025d994aca301b0ebf7ee7e02ee
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

731309 - Cannot umount NFS mount containing spaces


Keywords

nfs, nfs-utils


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/