- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0264 - Bug Fix Advisory
Synopsis
autofs bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated autofs package that fixes several bugs and adds one enhancement is
now available for Red Hat Enterprise Linux 5.
Description
The autofs utility controls the operation of the automount daemon. The automount
daemon automatically mounts and unmounts file systems.
This update fixes the following bugs:
- Previously, autofs submounts incorrectly handled shutdown synchronization and
lock restrictions. As a consequence, automount could be unresponsive when
submounts expired. With this update, the submount shuts down only after the
states ST_SHUTDOWN, ST_SHUTDOWN_PENDING, and ST_SHUTDOWN_FORCE, or when the
state changes to ST_READY. (BZ#655685)
- Previously, automount did not correctly parse unmatched brackets in
map entry server names. As a consequence, the sanity check for host
names in these map entries could fail. Now, unmatched brackets in server
names result in a syntax error being reported and the check no longer
fails. (BZ#692814)
- Previously, the automount logged confusing error messages when syntax errors
occurred in map entry locations. This update modifies these messages and
displays more informative messages were possible. (BZ#700142)
- Previously, LDAP servers did not correctly return an opaque cookie to check
for additional results when getting paged results from the server on 64-bit
PowerPC and IBM System z platforms due to slightly different criteria for
deciding if there are more results. As a consequence, the autofs internal
functions did not detect when paged result sets were not supported. This update
modifies the underlying source code so that autofs now correctly detects whether
the paged results are updated. (BZ#700896)
- Previously, an incorrect check for the presence of additional addresses for a
host led to the IP address being used for mounting instead of the host name. As
a consequence the IP address was displayed instead of the host name when listing
system mounts, even when the host had only a single address. This update
modifies the check so that the IP address is used only if a host has multiple IP
addresses. (BZ#725536)
- Previously, incorrect identification of the map entry source caused a failure
during the key lookup. As a consequence, map lookups for an automount, where a a
key was present in a file map and the same key was also found in an included
map, failed if the file map entry was removed and a lookup was performed before
a re-load is issued. This update modifies the key lookup code and the lookup
works now as expected. (BZ#731514, BZ#732333)
- Previously, automount could become unresponsive when reloading a master map
that included a combination of direct and indirect maps due to incorrect lock
ordering. This update corrects the logic used to determine if the lookup needs
to continue into included maps. (BZ#732332)
- Previously, map entries were always mounted using proximity and response time
instead of bind mounting when adding a random selection of a host if the mount
was local. This update modifies this behavior and also adds the "nobind" option
to allow the previous behavior to be forced if needed. (BZ#734675)
- Previously, the map key lookup mechanism did not find keys in an included
multi-mount map entry. This update modifies the lookup mechanism so that keys in
multi-mount map entries are now found correctly. (BZ#747020)
- Previously, the stack allocation function of the temporary work space was used
within a loop in the function lookup_ghost(). As a consequence, a stack overflow
could occur and automount then failed with a segmentation fault. This update
corrects the allocation usage and the stack overflows no longer occurs.
(BZ#759221)
This update also adds the following enhancement:
- With this update,the "--dumpmaps" option to dump maps has been added to dump
in autofs. (BZ#732334)
All users of autofs are advised to upgrade to this updated package, which fixes
these bugs and adds this enhancement.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
autofs-5.0.1-0.rc2.163.el5.src.rpm | SHA-256: 3cf3639c065a7c4d99da2dafb6412dca65391b21a713027094b71095ddc78b77 |
x86_64 | |
autofs-5.0.1-0.rc2.163.el5.x86_64.rpm | SHA-256: 7782407a4ed09f93978f4ac6b5756a123df59b4694ddbcd94248a6ed3c5195e0 |
ia64 | |
autofs-5.0.1-0.rc2.163.el5.ia64.rpm | SHA-256: 9b2614703556875e8452fe15268c56a2bc439f3e9c117da0068dbcfe6d0df4a9 |
i386 | |
autofs-5.0.1-0.rc2.163.el5.i386.rpm | SHA-256: b4951c1732f1bf8f5b337d5ab1c7ba9032dbcaab865b6aff665455b9358d9ff7 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
autofs-5.0.1-0.rc2.163.el5.src.rpm | SHA-256: 3cf3639c065a7c4d99da2dafb6412dca65391b21a713027094b71095ddc78b77 |
x86_64 | |
autofs-5.0.1-0.rc2.163.el5.x86_64.rpm | SHA-256: 7782407a4ed09f93978f4ac6b5756a123df59b4694ddbcd94248a6ed3c5195e0 |
i386 | |
autofs-5.0.1-0.rc2.163.el5.i386.rpm | SHA-256: b4951c1732f1bf8f5b337d5ab1c7ba9032dbcaab865b6aff665455b9358d9ff7 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
autofs-5.0.1-0.rc2.163.el5.src.rpm | SHA-256: 3cf3639c065a7c4d99da2dafb6412dca65391b21a713027094b71095ddc78b77 |
x86_64 | |
autofs-5.0.1-0.rc2.163.el5.x86_64.rpm | SHA-256: 7782407a4ed09f93978f4ac6b5756a123df59b4694ddbcd94248a6ed3c5195e0 |
i386 | |
autofs-5.0.1-0.rc2.163.el5.i386.rpm | SHA-256: b4951c1732f1bf8f5b337d5ab1c7ba9032dbcaab865b6aff665455b9358d9ff7 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
autofs-5.0.1-0.rc2.163.el5.src.rpm | SHA-256: 3cf3639c065a7c4d99da2dafb6412dca65391b21a713027094b71095ddc78b77 |
s390x | |
autofs-5.0.1-0.rc2.163.el5.s390x.rpm | SHA-256: fa490971f3dc1f80b1e76fd26f903a06f7af9e5d6172cf7b88ba0ca5aec71685 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
autofs-5.0.1-0.rc2.163.el5.src.rpm | SHA-256: 3cf3639c065a7c4d99da2dafb6412dca65391b21a713027094b71095ddc78b77 |
ppc | |
autofs-5.0.1-0.rc2.163.el5.ppc.rpm | SHA-256: dc80bb8ad8c847976436331cab34c656022cc0d4f44244feff4ba6348cf9723b |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
autofs-5.0.1-0.rc2.163.el5.src.rpm | SHA-256: 3cf3639c065a7c4d99da2dafb6412dca65391b21a713027094b71095ddc78b77 |
x86_64 | |
autofs-5.0.1-0.rc2.163.el5.x86_64.rpm | SHA-256: 7782407a4ed09f93978f4ac6b5756a123df59b4694ddbcd94248a6ed3c5195e0 |
i386 | |
autofs-5.0.1-0.rc2.163.el5.i386.rpm | SHA-256: b4951c1732f1bf8f5b337d5ab1c7ba9032dbcaab865b6aff665455b9358d9ff7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.