Updated nfs-utils packages that fix one bug are now available for Red HatEnterprise Linux 6.
The nfs-utils packages provide a daemon for the kernel Network File System (NFS)server and related tools, which provides better performance than the traditionalLinux NFS server used by most users.

These packages also contain the mount.nfs,umount.nfs, and showmount programs.This update fixes the following bug:* Due to an incorrectly used variable in the find_keytab_entry() function, therpc.gssd service terminated unexpectedly with a segmentation fault when readingthe /etc/krb5.keytab file.

A patch has been applied to fix this bug, andrpc.gssd no longer crashes in the described situation. (BZ#1363837)Users of nfs-utils are advised to upgrade to these updated packages, which fixthis bug.

After installing this update, the nfs service will be restartedautomatically.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
nfs-utils-1.2.3-70.el6_8.2.src.rpm
    MD5: fc270ad50021c00f01d3d08b0115f693SHA-256: c2e9b005c813836351f5184fdb92e8a0c2899ac5055e9e5d0ef40c2bba9d9756
 
IA-32:
nfs-utils-1.2.3-70.el6_8.2.i686.rpm
    MD5: efa89b712a4f9292741d900b0fff2524SHA-256: 7b9d3cb509f780119923ca3193c40e055389ea0db8dbd1aac442744220f98439
nfs-utils-debuginfo-1.2.3-70.el6_8.2.i686.rpm
    MD5: 97332d242e4c2571a35d52d2b1e7a0a5SHA-256: b6b0b09c35d174ea47169b6d3c00aec6bfe61356dc488de7d545b99e046df1ef
 
x86_64:
nfs-utils-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: 5f8816b9c4ebdd469ec31dc616d35edcSHA-256: 54f4c311b042e366490b9eaa683125b641f189ece063b4766cda180c4254a987
nfs-utils-debuginfo-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: c8678897fdbb25cf521591bae79a5093SHA-256: ceceba7e34e61f2e3c016d9f881f9a1f35aa2ef124ba2bd13e0326a4babaf775
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
nfs-utils-1.2.3-70.el6_8.2.src.rpm
    MD5: fc270ad50021c00f01d3d08b0115f693SHA-256: c2e9b005c813836351f5184fdb92e8a0c2899ac5055e9e5d0ef40c2bba9d9756
 
x86_64:
nfs-utils-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: 5f8816b9c4ebdd469ec31dc616d35edcSHA-256: 54f4c311b042e366490b9eaa683125b641f189ece063b4766cda180c4254a987
nfs-utils-debuginfo-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: c8678897fdbb25cf521591bae79a5093SHA-256: ceceba7e34e61f2e3c016d9f881f9a1f35aa2ef124ba2bd13e0326a4babaf775
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
nfs-utils-1.2.3-70.el6_8.2.src.rpm
    MD5: fc270ad50021c00f01d3d08b0115f693SHA-256: c2e9b005c813836351f5184fdb92e8a0c2899ac5055e9e5d0ef40c2bba9d9756
 
IA-32:
nfs-utils-1.2.3-70.el6_8.2.i686.rpm
    MD5: efa89b712a4f9292741d900b0fff2524SHA-256: 7b9d3cb509f780119923ca3193c40e055389ea0db8dbd1aac442744220f98439
nfs-utils-debuginfo-1.2.3-70.el6_8.2.i686.rpm
    MD5: 97332d242e4c2571a35d52d2b1e7a0a5SHA-256: b6b0b09c35d174ea47169b6d3c00aec6bfe61356dc488de7d545b99e046df1ef
 
PPC:
nfs-utils-1.2.3-70.el6_8.2.ppc64.rpm
    MD5: 4759e3ffb1a45f503affa8f15f0df756SHA-256: 6b247b1bebc93a415734387bbd4e0b40c26845e347ca22add3a9d18651cd7b7b
nfs-utils-debuginfo-1.2.3-70.el6_8.2.ppc64.rpm
    MD5: 2c02d7fa9412329ec0f03934f5eff7b1SHA-256: 0cde37417b8259feeb03b6d5ce25e67186d14b88a20095c5c6bb06eac6719041
 
s390x:
nfs-utils-1.2.3-70.el6_8.2.s390x.rpm
    MD5: 77cc6f9526a8db89879274201230d90eSHA-256: 899b9e55ed8b0e89576a3bfd2c897a51178debab9778a69cdf6c57ee043b2618
nfs-utils-debuginfo-1.2.3-70.el6_8.2.s390x.rpm
    MD5: 7f2186eac5cff6cf1407062fbf8d3340SHA-256: 9816429bb5b707cddf1772e0bd226e0a178e82a61325f96ecceac25499b96400
 
x86_64:
nfs-utils-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: 5f8816b9c4ebdd469ec31dc616d35edcSHA-256: 54f4c311b042e366490b9eaa683125b641f189ece063b4766cda180c4254a987
nfs-utils-debuginfo-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: c8678897fdbb25cf521591bae79a5093SHA-256: ceceba7e34e61f2e3c016d9f881f9a1f35aa2ef124ba2bd13e0326a4babaf775
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
nfs-utils-1.2.3-70.el6_8.2.src.rpm
    MD5: fc270ad50021c00f01d3d08b0115f693SHA-256: c2e9b005c813836351f5184fdb92e8a0c2899ac5055e9e5d0ef40c2bba9d9756
 
IA-32:
nfs-utils-1.2.3-70.el6_8.2.i686.rpm
    MD5: efa89b712a4f9292741d900b0fff2524SHA-256: 7b9d3cb509f780119923ca3193c40e055389ea0db8dbd1aac442744220f98439
nfs-utils-debuginfo-1.2.3-70.el6_8.2.i686.rpm
    MD5: 97332d242e4c2571a35d52d2b1e7a0a5SHA-256: b6b0b09c35d174ea47169b6d3c00aec6bfe61356dc488de7d545b99e046df1ef
 
x86_64:
nfs-utils-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: 5f8816b9c4ebdd469ec31dc616d35edcSHA-256: 54f4c311b042e366490b9eaa683125b641f189ece063b4766cda180c4254a987
nfs-utils-debuginfo-1.2.3-70.el6_8.2.x86_64.rpm
    MD5: c8678897fdbb25cf521591bae79a5093SHA-256: ceceba7e34e61f2e3c016d9f881f9a1f35aa2ef124ba2bd13e0326a4babaf775
 
(The unlinked packages above are only available from the Red Hat Network)

1363837 – cthon – rpc.gssd crash reading krb5.keytab in find_keytab_entry()

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply