Updated nfs-utils packages that fix one bug are now available for Red HatEnterprise Linux 7.2 Extended Update Support.
The nfs-utils packages provide a daemon for the kernel Network File System (NFS)server and related tools, which provides better performance than the traditionalLinux NFS server used by most users.

These packages also contain the mount.nfs,umount.nfs, and showmount programs.This update fixes the following bug:* Due to an incorrectly used variable in the find_keytab_entry() function, therpc.gssd service terminated unexpectedly with a segmentation fault when readingthe /etc/krb5.keytab file.

A patch has been applied to fix this bug, andrpc.gssd no longer crashes in the described situation. (BZ#1368371)Users of nfs-utils are advised to upgrade to these updated packages, which fixthis bug.

After installing this update, the nfs service will be restartedautomatically.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux HPC Node EUS (v. 7.2)

SRPMS:
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm
    MD5: 210361edecd74d0101c5724d0cd932fdSHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0
 
x86_64:
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: 199330c71b4af82b6fc8518f67fdc514SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: dd017a9802ba9e72691ac197022a9142SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d
 
Red Hat Enterprise Linux Server AUS (v. 7.2)

SRPMS:
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm
    MD5: 210361edecd74d0101c5724d0cd932fdSHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0
 
x86_64:
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: 199330c71b4af82b6fc8518f67fdc514SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: dd017a9802ba9e72691ac197022a9142SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d
 
Red Hat Enterprise Linux Server EUS (v. 7.2)

SRPMS:
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm
    MD5: 210361edecd74d0101c5724d0cd932fdSHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0
 
PPC:
nfs-utils-1.3.0-0.21.el7_2.2.ppc64.rpm
    MD5: f18f6e81631c538df4b2080b02a2b598SHA-256: 3fe367125c0d5217c24987caa697dccba1ffd3027855a3a419d88e10551ca909
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.ppc64.rpm
    MD5: 5dd7a79660d913fd224121a7bb3af680SHA-256: d52e87590110f9b843571e325b934e6d48579a57844a114bc5ef2ccc47c18342
 
PPC64LE:
nfs-utils-1.3.0-0.21.el7_2.2.ppc64le.rpm
    MD5: 0c05009f6938c6a706ffbcd4d7670245SHA-256: a6e82cd72a30523123f542db375129f3925a0e1dbc3c8ef5ab834088c65afe72
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.ppc64le.rpm
    MD5: a1dfdb24af723c207f6d6744bd005b87SHA-256: 3d67d37c786e1451136abeff9cf64633c6e1031db75a16129e973c9f48d56dd0
 
s390x:
nfs-utils-1.3.0-0.21.el7_2.2.s390x.rpm
    MD5: 26691461f253f2d62a0feaf2c24a9b42SHA-256: c8aece76613cb3b39224064adf6cd70038028147ceb1aaa2d14fc52875564dc0
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.s390x.rpm
    MD5: e5c09638f134b8e10459ba6e25e9358bSHA-256: e819fd348b4eeb24eb3b9caa4049309baf0644dadcab78bc2fb2163fa27a56ae
 
x86_64:
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: 199330c71b4af82b6fc8518f67fdc514SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: dd017a9802ba9e72691ac197022a9142SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d
 
Red Hat Enterprise Linux Server TUS (v. 7.2)

SRPMS:
nfs-utils-1.3.0-0.21.el7_2.2.src.rpm
    MD5: 210361edecd74d0101c5724d0cd932fdSHA-256: 0195236e10636b59967dfcbe9aada19f343efd481c2d4b769bdca04fd60642d0
 
x86_64:
nfs-utils-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: 199330c71b4af82b6fc8518f67fdc514SHA-256: 5b106a8b9abe1f72e7de1b6f0254057ec83129dc924c9d257ad99599635a629e
nfs-utils-debuginfo-1.3.0-0.21.el7_2.2.x86_64.rpm
    MD5: dd017a9802ba9e72691ac197022a9142SHA-256: 56a34aa55f0c5f1700137c8a3b6208298ffcd24ae9a55582e17210ce94f0045d
 
(The unlinked packages above are only available from the Red Hat Network)

1368371 – cthon – rpc.gssd crash reading krb5.keytab in find_keytab_entry()

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply