Skip to navigation

Bug Fix Advisory nfs-utils bug fix update

Advisory: RHBA-2010:0604-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-08-05
Last updated on: 2010-08-05
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated nfs-utils package that fixes a bug that presented in some
circumstances when NFS file system mounts were attempted in the background
is now available.

The nfs-utils package provides a daemon for the kernel Network File System
(NFS) server, and related tools such as the mount.nfs, umount.nfs, and
showmount programs.

This updated package fixes the following bug:

* when an Network File System (NFS) client attempts to mount an NFS
exported file system the try_mount() function is called once and two
variables -- mount_opts and extra_opts -- are setup to handle any options
sent with the mount command. One option -- bg -- sets the command to fork
and continue attempting to mount the file system in the background should
the initial attempt fail. In some circumstances, when the bg option was
used and the initial call to try_mount() failed, options set in the
extra_opts variable were lost when the try_mount() function was called
again. This update fixes this: using the bg option now works as expected,
with all specified and default options honored when an NFS export is
mounted in the background. (BZ#614491)

All nfs-utils users should upgrade to this updated package, which resolves
this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nfs-utils-1.0.9-47.el5_5.src.rpm
File outdated by:  RHBA-2013:1301
    MD5: d197064a93abaaa5bc359efe340caa6b
SHA-256: 7b15332ef95b60912eadd117188d47ac793947042ecaf158f35f42337d334100
 
IA-32:
nfs-utils-1.0.9-47.el5_5.i386.rpm
File outdated by:  RHBA-2013:1301
    MD5: 64ee3f73664e86c315d08a6f7e2af48d
SHA-256: b23ca9cc5ad37f290f4e8fe6d124631634fca4ba8e120f1e10c9313c5ab84d87
 
IA-64:
nfs-utils-1.0.9-47.el5_5.ia64.rpm
File outdated by:  RHBA-2013:1301
    MD5: 95cd88b568b63a116551c098af4efa62
SHA-256: 53c76ecd20b899badbd027eb6c8b406c1f4bd7e144cce200cacffb89108663c3
 
PPC:
nfs-utils-1.0.9-47.el5_5.ppc.rpm
File outdated by:  RHBA-2013:1301
    MD5: 97499248e505ab0aa89f7cdfddb428a4
SHA-256: e191a21c330fa27e59d31c6c17052bf249ff9e309f2adb55d997d0fffc83c1e1
 
s390x:
nfs-utils-1.0.9-47.el5_5.s390x.rpm
File outdated by:  RHBA-2013:1301
    MD5: 7f75555f28af2b1a7ebfdec3bdfdcfb4
SHA-256: 2631e40570fa35cda541b9770606c6f371e37ec3e6141d214b83355cce816837
 
x86_64:
nfs-utils-1.0.9-47.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1301
    MD5: 6bf9f0f23a3155621ad38aa83605c40b
SHA-256: 84a3eb8ca86a3510e4539045aa9563e3acf14f791df82d8b019d51772a2b2db2
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
nfs-utils-1.0.9-47.el5_5.src.rpm
File outdated by:  RHBA-2013:1301
    MD5: d197064a93abaaa5bc359efe340caa6b
SHA-256: 7b15332ef95b60912eadd117188d47ac793947042ecaf158f35f42337d334100
 
IA-32:
nfs-utils-1.0.9-47.el5_5.i386.rpm
File outdated by:  RHBA-2013:1301
    MD5: 64ee3f73664e86c315d08a6f7e2af48d
SHA-256: b23ca9cc5ad37f290f4e8fe6d124631634fca4ba8e120f1e10c9313c5ab84d87
 
x86_64:
nfs-utils-1.0.9-47.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1301
    MD5: 6bf9f0f23a3155621ad38aa83605c40b
SHA-256: 84a3eb8ca86a3510e4539045aa9563e3acf14f791df82d8b019d51772a2b2db2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

614491 - NFS mount options can be lost when using bg option


Keywords

nfs, nfs-utils


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/