Updated nfs-utils packages that fix one bug are now available for Red HatEnterprise Linux 5.

The nfs-utils packages provide a daemon for the kernel Network File System (NFS)server and related tools, which provides better performance than the traditionalLinux NFS server used by most users. These packages also contain the mount.nfs,umount.nfs, and showmount programs.This update fixes the following bug:* Previously, when using NetApp filers as NFS servers, the rpc.statd daemon insome cases terminated unexpectedly. The glibc API segmentation violation in theserver Remote Procedure Call (RPC) code that was causing this crash has beencorrected, and the described problem no longer occurs. (BZ#1159164)Users of nfs-utils are advised to upgrade to these updated packages, which fixthis bug. After installing this update, the nfs service will be restartedautomatically.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nfs-utils-1.0.9-71.el5_11.src.rpm
    MD5: 6ae71888b8b3866361d4175954134d0cSHA-256: c55c966f0f2fb3ccb43cf4d1bad2016c006bd8ea12d1902139198f97740c42e2
 
IA-32:
nfs-utils-1.0.9-71.el5_11.i386.rpm
    MD5: 11c74f1d25752a3bbb5903c3965871c8SHA-256: 9b0895afece02d12f01c59e0a79e6873fbbed1bdf99bcef5f5a1ef4508924d7b
nfs-utils-debuginfo-1.0.9-71.el5_11.i386.rpm
    MD5: 1a18fce33fddca1a7db36167d123c129SHA-256: d9a876d80263f2df460816ca2102d1c067879825e06b1e920247f331cdc4c039
 
IA-64:
nfs-utils-1.0.9-71.el5_11.ia64.rpm
    MD5: 06babd25faa60455bec53978d070c563SHA-256: 8f43d3cd446576922d62b7daa7c60593ad5b13ea2b38b8b1f476f086e02804f3
nfs-utils-debuginfo-1.0.9-71.el5_11.ia64.rpm
    MD5: 668d014b82d000401be1f227db622a17SHA-256: 476393e0ddb5791bdc38e3321bccb6991e986bf092c3f014448943a0e8a6d50d
 
PPC:
nfs-utils-1.0.9-71.el5_11.ppc.rpm
    MD5: 90a4d4540cf01a958ed2dc0d75499262SHA-256: 37a8b7a9d7343e32f6a311368cfb15b666e1a1dd49e00a09524dd09916cfddb9
nfs-utils-debuginfo-1.0.9-71.el5_11.ppc.rpm
    MD5: 17e09ae0dc83e8c0e148f2ed476dcf3cSHA-256: d8498163f4644346686db370cba56cfdb5a6b652d9006dec5a1863de7f328028
 
s390x:
nfs-utils-1.0.9-71.el5_11.s390x.rpm
    MD5: b81e4bc56f7c36e87e0febcaa8a939d3SHA-256: cfe140e8e92be694c28ec87f4de923c18822b2328d7c48fbbd02e7865827b1c0
nfs-utils-debuginfo-1.0.9-71.el5_11.s390x.rpm
    MD5: 3e812838c08d744eca6b0c05507b28e2SHA-256: 5b2867731d060fbce3852a8d96721d5bce841b94887999423d9b14400dc26ea9
 
x86_64:
nfs-utils-1.0.9-71.el5_11.x86_64.rpm
    MD5: ccede0547e6d8cddcc57a2f1efacdb7bSHA-256: 4ef0d268bbd031621aa1459524cee8be1b3646faf4f732f3e0dae43ae0f25c55
nfs-utils-debuginfo-1.0.9-71.el5_11.x86_64.rpm
    MD5: feb0aba4ea968a45b5a8ff005b7ec1d7SHA-256: 50a7533001ad3760007ad656fba96b3ed4eedb8abb532fff299ea79a99b48286
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
nfs-utils-1.0.9-71.el5_11.src.rpm
    MD5: 6ae71888b8b3866361d4175954134d0cSHA-256: c55c966f0f2fb3ccb43cf4d1bad2016c006bd8ea12d1902139198f97740c42e2
 
IA-32:
nfs-utils-1.0.9-71.el5_11.i386.rpm
    MD5: 11c74f1d25752a3bbb5903c3965871c8SHA-256: 9b0895afece02d12f01c59e0a79e6873fbbed1bdf99bcef5f5a1ef4508924d7b
nfs-utils-debuginfo-1.0.9-71.el5_11.i386.rpm
    MD5: 1a18fce33fddca1a7db36167d123c129SHA-256: d9a876d80263f2df460816ca2102d1c067879825e06b1e920247f331cdc4c039
 
x86_64:
nfs-utils-1.0.9-71.el5_11.x86_64.rpm
    MD5: ccede0547e6d8cddcc57a2f1efacdb7bSHA-256: 4ef0d268bbd031621aa1459524cee8be1b3646faf4f732f3e0dae43ae0f25c55
nfs-utils-debuginfo-1.0.9-71.el5_11.x86_64.rpm
    MD5: feb0aba4ea968a45b5a8ff005b7ec1d7SHA-256: 50a7533001ad3760007ad656fba96b3ed4eedb8abb532fff299ea79a99b48286
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply