- Issued:
- 2016-12-20
- Updated:
- 2016-12-20
RHBA-2016:2967 - Bug Fix Advisory
Synopsis
nfs-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated nfs-utils packages that fix one bug are now available for Red Hat Enterprise Linux 7.2 Extended Update Support.
Description
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
This update fixes the following bug:
- Due to an incorrectly used variable in the find_keytab_entry() function, the rpc.gssd service terminated unexpectedly with a segmentation fault when reading the /etc/krb5.keytab file. A patch has been applied to fix this bug, and rpc.gssd no longer crashes in the described situation. (BZ#1368371)
Users of nfs-utils are advised to upgrade to these updated packages, which fix this bug. After installing this update, the nfs service will be restarted automatically.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.2 x86_64
- Red Hat Enterprise Linux Server - AUS 7.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.2 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.2 ppc64
- Red Hat Enterprise Linux EUS Compute Node 7.2 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 7.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.2 x86_64
Fixes
- BZ - 1368371 - cthon - rpc.gssd crash reading krb5.keytab in find_keytab_entry()
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
x86_64 | |
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d |
Red Hat Enterprise Linux Server - AUS 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
x86_64 | |
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
s390x | |
nfs-utils-1.3.0-0.21.el7_2.2.s390x.rpm | SHA-256: c8aece76613cb3b39224064adf6cd70038028147ceb1aaa2d14fc52875564dc0 |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.s390x.rpm | SHA-256: e819fd348b4eeb24eb3b9caa4049309baf0644dadcab78bc2fb2163fa27a56ae |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
ppc64 | |
nfs-utils-1.3.0-0.21.el7_2.2.ppc64.rpm | SHA-256: 3fe367125c0d5217c24987caa697dccba1ffd3027855a3a419d88e10551ca909 |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.ppc64.rpm | SHA-256: d52e87590110f9b843571e325b934e6d48579a57844a114bc5ef2ccc47c18342 |
Red Hat Enterprise Linux EUS Compute Node 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
x86_64 | |
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
ppc64le | |
nfs-utils-1.3.0-0.21.el7_2.2.ppc64le.rpm | SHA-256: a6e82cd72a30523123f542db375129f3925a0e1dbc3c8ef5ab834088c65afe72 |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.ppc64le.rpm | SHA-256: 3d67d37c786e1451136abeff9cf64633c6e1031db75a16129e973c9f48d56dd0 |
Red Hat Enterprise Linux Server - TUS 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
x86_64 | |
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.2
SRPM | |
---|---|
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm | SHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0 |
x86_64 | |
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e |
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm | SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.