Bug Fix Advisory cifs-utils bug fix update

Advisory: RHBA-2013:1654-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated cifs-utils packages that fix one bug are available for Red Hat
Enterprise Linux 6.

The SMB/CIFS protocol is a standard file sharing protocol widely deployed on
Microsoft Windows machines. This package contains tools for mounting shares on
Linux using the SMB/CIFS protocol. The tools in this package work in conjunction
with support in the kernel to allow one to mount a SMB/CIFS share onto a client
and use it as if it were a standard Linux file system.

This update fixes the following bug:

Due to a bug in the underlying code, the setcifsacl utility did not process
multiple comma-separated access control lists (ACLs) correctly. Consequently,
setcifsacl became unresponsive when processing such ACLs on the command line.
This bug has been fixed, and setcifsacl now handles multiple comma-separated
ACLs as expected. (BZ#905721)

Users of cifs-utils are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
cifs-utils-4.8.1-19.el6.src.rpm
File outdated by:  RHBA-2015:1366
    MD5: e0f5296c5963376ada4ce90af54a83f5
SHA-256: 30955a592b53be688c257bb2d9ec590fdddaf7375758903a3c73334f91024059
 
IA-32:
cifs-utils-4.8.1-19.el6.i686.rpm
File outdated by:  RHBA-2015:1366
    MD5: 72846bfb4f3a36e89308078883c92189
SHA-256: 12d80a713b83b3c1ff420a78d405827409d588746e8b7647d0bb712601bebd4e
cifs-utils-debuginfo-4.8.1-19.el6.i686.rpm
File outdated by:  RHBA-2015:1366
    MD5: f74841b70090a4e29bf745c0281745bf
SHA-256: b61492f6e5d13334e0061c40a9c49a958510d5b77115273aa80c87237e68b24c
 
x86_64:
cifs-utils-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 38a581b40989e3177a7b64ceef8db34e
SHA-256: 3351ef5aeeb78ad300713f35b3f087c613cc6b1f77de6e58bbc1000659a9fb21
cifs-utils-debuginfo-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 84f0ad7123c7a790f9e2a073011a3e2d
SHA-256: 8c40095e54c1446cfb911f69ba15c532f76dbb228961e05d31ce9af045493070
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
cifs-utils-4.8.1-19.el6.src.rpm
File outdated by:  RHBA-2015:1366
    MD5: e0f5296c5963376ada4ce90af54a83f5
SHA-256: 30955a592b53be688c257bb2d9ec590fdddaf7375758903a3c73334f91024059
 
x86_64:
cifs-utils-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 38a581b40989e3177a7b64ceef8db34e
SHA-256: 3351ef5aeeb78ad300713f35b3f087c613cc6b1f77de6e58bbc1000659a9fb21
cifs-utils-debuginfo-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 84f0ad7123c7a790f9e2a073011a3e2d
SHA-256: 8c40095e54c1446cfb911f69ba15c532f76dbb228961e05d31ce9af045493070
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
cifs-utils-4.8.1-19.el6.src.rpm
File outdated by:  RHBA-2015:1366
    MD5: e0f5296c5963376ada4ce90af54a83f5
SHA-256: 30955a592b53be688c257bb2d9ec590fdddaf7375758903a3c73334f91024059
 
IA-32:
cifs-utils-4.8.1-19.el6.i686.rpm
File outdated by:  RHBA-2015:1366
    MD5: 72846bfb4f3a36e89308078883c92189
SHA-256: 12d80a713b83b3c1ff420a78d405827409d588746e8b7647d0bb712601bebd4e
cifs-utils-debuginfo-4.8.1-19.el6.i686.rpm
File outdated by:  RHBA-2015:1366
    MD5: f74841b70090a4e29bf745c0281745bf
SHA-256: b61492f6e5d13334e0061c40a9c49a958510d5b77115273aa80c87237e68b24c
 
PPC:
cifs-utils-4.8.1-19.el6.ppc64.rpm
File outdated by:  RHBA-2015:1366
    MD5: c72af4383d35ea6f01e378fdbee39fc1
SHA-256: a33f725d275ddc7a12e4278dcbee1355f66abe655f35e7b85535e6dd24f0a4b9
cifs-utils-debuginfo-4.8.1-19.el6.ppc64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 6dc980a3fad5436903c355ed023377a5
SHA-256: 4cecb41a3847658761777321830f7ea0248eb7bcfa77b74e7d7cb0995d5e6bfd
 
s390x:
cifs-utils-4.8.1-19.el6.s390x.rpm
File outdated by:  RHBA-2015:1366
    MD5: 4be64ca70b3a81769d996913ea2fee5a
SHA-256: ebce1b7cd9b622e2ea08ff43a9dafd34477f0e1c32189dad96474901af0d769f
cifs-utils-debuginfo-4.8.1-19.el6.s390x.rpm
File outdated by:  RHBA-2015:1366
    MD5: 6c27c79ec008504b5a91d1de7656b02e
SHA-256: 4152bb8812ca8ed3093944e868203f036e53163cdf64ac545eda61f981d9eaa0
 
x86_64:
cifs-utils-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 38a581b40989e3177a7b64ceef8db34e
SHA-256: 3351ef5aeeb78ad300713f35b3f087c613cc6b1f77de6e58bbc1000659a9fb21
cifs-utils-debuginfo-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 84f0ad7123c7a790f9e2a073011a3e2d
SHA-256: 8c40095e54c1446cfb911f69ba15c532f76dbb228961e05d31ce9af045493070
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
cifs-utils-4.8.1-19.el6.src.rpm
File outdated by:  RHBA-2015:1366
    MD5: e0f5296c5963376ada4ce90af54a83f5
SHA-256: 30955a592b53be688c257bb2d9ec590fdddaf7375758903a3c73334f91024059
 
IA-32:
cifs-utils-4.8.1-19.el6.i686.rpm
File outdated by:  RHBA-2015:1366
    MD5: 72846bfb4f3a36e89308078883c92189
SHA-256: 12d80a713b83b3c1ff420a78d405827409d588746e8b7647d0bb712601bebd4e
cifs-utils-debuginfo-4.8.1-19.el6.i686.rpm
File outdated by:  RHBA-2015:1366
    MD5: f74841b70090a4e29bf745c0281745bf
SHA-256: b61492f6e5d13334e0061c40a9c49a958510d5b77115273aa80c87237e68b24c
 
x86_64:
cifs-utils-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 38a581b40989e3177a7b64ceef8db34e
SHA-256: 3351ef5aeeb78ad300713f35b3f087c613cc6b1f77de6e58bbc1000659a9fb21
cifs-utils-debuginfo-4.8.1-19.el6.x86_64.rpm
File outdated by:  RHBA-2015:1366
    MD5: 84f0ad7123c7a790f9e2a073011a3e2d
SHA-256: 8c40095e54c1446cfb911f69ba15c532f76dbb228961e05d31ce9af045493070
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/