Security update for nfs-utils
SUSE Security Update: Security update for nfs-utils
nfs-utils receives hereby a LTSS roll-up security and
bugfix update.
* CVE-2013-1923: Allow DNS lookups to be avoided when
determining kerberos identity of server. The
NFS_GSSD_AVOID_DNS sysconfig variable must to be set for
this to take full effect as some installations could be
negatively affected by this change
More bugs have been fixed:
* Fixed bugs with the info provided by "showmount -e"
not being updated correctly. (bnc#661493)
* nfsserver.init: Fix initialization of
/var/lib/nfs/state and run sm-notify at start up time when
necessary (bnc#628887)
* Increase number of supported krb5 mounts from 32 to
256. (bnc#716463)
* Avoid crash if krb5_init_context fails (bnc#806840)
Security Issue reference:
* CVE-2013-1923
>
Announcement ID: | SUSE-SU-2013:1668-1 |
Rating: | moderate |
References: | #628887 #661493 #716463 #806840 #813464 |
Affected Products: |
An update that solves one vulnerability and has four fixes is now available.
Description:
nfs-utils receives hereby a LTSS roll-up security and
bugfix update.
* CVE-2013-1923: Allow DNS lookups to be avoided when
determining kerberos identity of server. The
NFS_GSSD_AVOID_DNS sysconfig variable must to be set for
this to take full effect as some installations could be
negatively affected by this change
More bugs have been fixed:
* Fixed bugs with the info provided by "showmount -e"
not being updated correctly. (bnc#661493)
* nfsserver.init: Fix initialization of
/var/lib/nfs/state and run sm-notify at start up time when
necessary (bnc#628887)
* Increase number of supported krb5 mounts from 32 to
256. (bnc#716463)
* Avoid crash if krb5_init_context fails (bnc#806840)
Security Issue reference:
* CVE-2013-1923
Package List:
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
- nfs-utils-1.0.7-36.39.42.1
References:
- http://support.novell.com/security/cve/CVE-2013-1923.html
- https://bugzilla.novell.com/628887
- https://bugzilla.novell.com/661493
- https://bugzilla.novell.com/716463
- https://bugzilla.novell.com/806840
- https://bugzilla.novell.com/813464
- http://download.suse.com/patch/finder/?keywords=d09650071376a0484c040c98456e0ff5