Skip to navigation

Security Advisory Low: nfs-utils security, bug fix, and enhancement update

Advisory: RHSA-2011:1534-3
Type: Security Advisory
Severity: Low
Issued on: 2011-12-06
Last updated on: 2011-12-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-1749
CVE-2011-2500

Details

Updated nfs-utils packages that fix two security issues, various bugs, and
add one enhancement are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The nfs-utils packages provide a daemon for the kernel Network File System
(NFS) server, and related tools such as the mount.nfs, umount.nfs, and
showmount programs.

A flaw was found in the way nfs-utils performed IP based authentication of
mount requests. In configurations where a directory was exported to a group
of systems using a DNS wildcard or NIS (Network Information Service)
netgroup, an attacker could possibly gain access to other directories
exported to a specific host or subnet, bypassing intended access
restrictions. (CVE-2011-2500)

It was found that the mount.nfs tool did not handle certain errors
correctly when updating the mtab (mounted file systems table) file. A local
attacker could use this flaw to corrupt the mtab file. (CVE-2011-1749)

This update also fixes several bugs and adds an enhancement. Documentation
for these bug fixes and the enhancement will be available shortly from the
Technical Notes document, linked to in the References section.

Users of nfs-utils are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues and add this
enhancement. After installing this update, the nfs service will be
restarted automatically.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
nfs-utils-1.2.3-15.el6.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 49099934a5a3c402164a37f0044781a4
SHA-256: 15664f495b63e3415c8b26b2463bddf9d3ad0dc9364dc8b610d91746bef1c505
 
IA-32:
nfs-utils-1.2.3-15.el6.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: b67490386ca09cf460dd6f60e4dee048
SHA-256: 8f96716b8948d9143887dce3b3e71ec52c802cd04ddd3892d3fff8364e8cb435
nfs-utils-debuginfo-1.2.3-15.el6.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: 9bb0d4892acf64b5e61b6c8bab7fd7b0
SHA-256: 3ac85d7e877d40437f5ebb2c7aaef867a040d114c22bd54b4535a2a993060b2d
 
x86_64:
nfs-utils-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 13270e6e52bfd293286f5ef12c32a314
SHA-256: 4a617ecaa20f41b57ecbd8d279435e3a1b06f7d1f2be6c3ffab4741e1daf248a
nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 021f0f6620babb396340af101fe0707c
SHA-256: 08696a1ad10358ea1a252fe040825f561c740c674d43ecc1f4d4b2c678d90c21
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
nfs-utils-1.2.3-15.el6.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 49099934a5a3c402164a37f0044781a4
SHA-256: 15664f495b63e3415c8b26b2463bddf9d3ad0dc9364dc8b610d91746bef1c505
 
x86_64:
nfs-utils-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 13270e6e52bfd293286f5ef12c32a314
SHA-256: 4a617ecaa20f41b57ecbd8d279435e3a1b06f7d1f2be6c3ffab4741e1daf248a
nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 021f0f6620babb396340af101fe0707c
SHA-256: 08696a1ad10358ea1a252fe040825f561c740c674d43ecc1f4d4b2c678d90c21
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
nfs-utils-1.2.3-15.el6.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 49099934a5a3c402164a37f0044781a4
SHA-256: 15664f495b63e3415c8b26b2463bddf9d3ad0dc9364dc8b610d91746bef1c505
 
IA-32:
nfs-utils-1.2.3-15.el6.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: b67490386ca09cf460dd6f60e4dee048
SHA-256: 8f96716b8948d9143887dce3b3e71ec52c802cd04ddd3892d3fff8364e8cb435
nfs-utils-debuginfo-1.2.3-15.el6.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: 9bb0d4892acf64b5e61b6c8bab7fd7b0
SHA-256: 3ac85d7e877d40437f5ebb2c7aaef867a040d114c22bd54b4535a2a993060b2d
 
PPC:
nfs-utils-1.2.3-15.el6.ppc64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 5284de1f56bae62912a931d8b8a140fc
SHA-256: c431b4f03a58711e2c5be50a9fdbaaf5a42459a9fc244d1535e0a1e768444ce6
nfs-utils-debuginfo-1.2.3-15.el6.ppc64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 5d5eec2c5de210248fa2db630a957385
SHA-256: 591d13cc22c7092306092930f829971460b63b4351d151a1f3d7014e6842d2a1
 
s390x:
nfs-utils-1.2.3-15.el6.s390x.rpm
File outdated by:  RHBA-2013:1714
    MD5: cd65f8dd9a55732da4b36c9c43e73bb8
SHA-256: ccf642953fc80c9fb92e09eaed8111bf1910ebfcafbcaf48e7febeda24b72b49
nfs-utils-debuginfo-1.2.3-15.el6.s390x.rpm
File outdated by:  RHBA-2013:1714
    MD5: c5eb21a5f7f9dfcb2f958558bd733bff
SHA-256: a04309b9abefa36566cc0b3d37ee3f024117e5a0fa60e809387af94019079dbc
 
x86_64:
nfs-utils-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 13270e6e52bfd293286f5ef12c32a314
SHA-256: 4a617ecaa20f41b57ecbd8d279435e3a1b06f7d1f2be6c3ffab4741e1daf248a
nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 021f0f6620babb396340af101fe0707c
SHA-256: 08696a1ad10358ea1a252fe040825f561c740c674d43ecc1f4d4b2c678d90c21
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
nfs-utils-1.2.3-15.el6.src.rpm
File outdated by:  RHBA-2013:1714
    MD5: 49099934a5a3c402164a37f0044781a4
SHA-256: 15664f495b63e3415c8b26b2463bddf9d3ad0dc9364dc8b610d91746bef1c505
 
IA-32:
nfs-utils-1.2.3-15.el6.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: b67490386ca09cf460dd6f60e4dee048
SHA-256: 8f96716b8948d9143887dce3b3e71ec52c802cd04ddd3892d3fff8364e8cb435
nfs-utils-debuginfo-1.2.3-15.el6.i686.rpm
File outdated by:  RHBA-2013:1714
    MD5: 9bb0d4892acf64b5e61b6c8bab7fd7b0
SHA-256: 3ac85d7e877d40437f5ebb2c7aaef867a040d114c22bd54b4535a2a993060b2d
 
x86_64:
nfs-utils-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 13270e6e52bfd293286f5ef12c32a314
SHA-256: 4a617ecaa20f41b57ecbd8d279435e3a1b06f7d1f2be6c3ffab4741e1daf248a
nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm
File outdated by:  RHBA-2013:1714
    MD5: 021f0f6620babb396340af101fe0707c
SHA-256: 08696a1ad10358ea1a252fe040825f561c740c674d43ecc1f4d4b2c678d90c21
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

692702 - rpc.idmapd sometimes fails to start due to sunrpc
697975 - CVE-2011-1749 nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE
702273 - Cannot umount NFS mount containing spaces
715078 - update exports(5) manpage with details about ipv6 configuration
716949 - CVE-2011-2500 nfs-utils: Improper authentication of an incoming request when an IP based authentication used
720479 - nfs-utils-1.2.3 breaks svcgssd - incorrectly orders libraries when built from source
723438 - rpc.mountd can segfault with showmount - REFERENCE TO PATCH THAT FIXES THIS
729001 - Debug file missing in debuginfo package for a binary
747400 - RHEL 6.2 beta rpcdebug has no flag for pNFS debug


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/