- Issued:
- 2007-04-28
- Updated:
- 2007-04-28
RHBA-2007:0274 - Bug Fix Advisory
Synopsis
autofs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated autofs packages that fix various bugs are now available.
Description
The autofs packages control the operation of the automount daemons. The
automount daemons automatically mount and unmount file systems after a
period of inactivity. File systems can include network file systems,
CD-ROMs, diskettes, and other media.
These updated packages apply the following bug fixes:
The autofs name service switch code did not consult ldap when determining
the source of an automounter map. If ldap was explicitly requested in a
map entry, then the base dn would need to be specified. These two issues
have been resolved.
The automount daemon now supports a new flag:
- -random-multimount-selection. When specified, the choice of server in a
replicated server entry is decided at random, bypassing the weighting scheme.
If an ldap map had multiple map key attributes, the automounter would try
to mount each one in succession. This has been fixed by stopping the
iteration process after a successful mount.
Autofs did not close all open file descriptors handed to it. As a result,
an rpm upgrade from an ssh session could prevent the ssh session from
terminating.
Several utilities may update the /etc/mtab file, and not all of these
utilities can be trusted to perform file locking correctly. In addition,
if there is too much contention for the mtab lock, the mount command will
time out, and return an error code indicating that the mount was
successful, but it failed to update the mount table. In either case, the
contents of /etc/mtab may not reflect the current state of mounted file
systems. Since the automounter relies on accurate state information, it
now looks to /proc/mounts when determining the current list of mounted file
systems.
The automounter did not correctly identify entries with embedded spaces.
Large map entries could overflow an internal buffer.
The autofs init script redirects some output to /dev/null. In some cases,
the syntax for doing this was incorrect.
A 'service autofs condrestart' command would fail if the map was originally
empty.
Autofs did not check the right bits in the error code returned from e2fsck.
A recent update incorrectly caused autofs to require maps to reside in /etc.
Autofs uses the yp_order command to determine if a map is available via
NIS. Some nisplus servers running in nis compatibility mode do not support
the yp_order command. In such cases, autofs should use yp_master as a fallback.
Automount man pages did not sufficiently document the flags format for
auto.master.
Autofs used more connections and queries to ldap servers than was
necessary, incurring undue load.
Autofs was not able to restart when some automounted file systems were busy.
Autofs did not properly pass the timeout option along to submounts
(-fstype=autofs).
All users of autofs should upgrade to these updated packages, which resolve
these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 191204 - Can not log out after updating autofs
- BZ - 194364 - Autofs cannot mount nfs exports with escaped whitespaces
- BZ - 195679 - If a map entry is > 255 chars, automounter fails
- BZ - 199441 - autofs reload and condrestart fail if map is originally empty
- BZ - 202860 - file maps not in /etc/ get mangled by /usr/lib/autofs/nsswitch
- BZ - 205472 - autofs compatilibity issue between nsswitch and NIS+ server
- BZ - 209635 - documentation for auto.master does not describe flag format
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
autofs-4.1.3-199.3.src.rpm | SHA-256: a7b39daa9434e0f89f8179e5a3c45da4376dc1d42cb858b6c650ce433f0059d5 |
x86_64 | |
autofs-4.1.3-199.3.x86_64.rpm | SHA-256: 64577ca5167907920579040682c6787061470edab6c7d85daf9e5c88ab1c2de3 |
autofs-4.1.3-199.3.x86_64.rpm | SHA-256: 64577ca5167907920579040682c6787061470edab6c7d85daf9e5c88ab1c2de3 |
ia64 | |
autofs-4.1.3-199.3.ia64.rpm | SHA-256: d13f6e31d3580925f8fc813bf67ded8486991ab852c4ff2aab8d28219bf899c9 |
autofs-4.1.3-199.3.ia64.rpm | SHA-256: d13f6e31d3580925f8fc813bf67ded8486991ab852c4ff2aab8d28219bf899c9 |
i386 | |
autofs-4.1.3-199.3.i386.rpm | SHA-256: a3f4680427536eb087a972f6bfd5954460d95b8092230ad9288aae785f91028f |
autofs-4.1.3-199.3.i386.rpm | SHA-256: a3f4680427536eb087a972f6bfd5954460d95b8092230ad9288aae785f91028f |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
autofs-4.1.3-199.3.src.rpm | SHA-256: a7b39daa9434e0f89f8179e5a3c45da4376dc1d42cb858b6c650ce433f0059d5 |
x86_64 | |
autofs-4.1.3-199.3.x86_64.rpm | SHA-256: 64577ca5167907920579040682c6787061470edab6c7d85daf9e5c88ab1c2de3 |
ia64 | |
autofs-4.1.3-199.3.ia64.rpm | SHA-256: d13f6e31d3580925f8fc813bf67ded8486991ab852c4ff2aab8d28219bf899c9 |
i386 | |
autofs-4.1.3-199.3.i386.rpm | SHA-256: a3f4680427536eb087a972f6bfd5954460d95b8092230ad9288aae785f91028f |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
autofs-4.1.3-199.3.src.rpm | SHA-256: a7b39daa9434e0f89f8179e5a3c45da4376dc1d42cb858b6c650ce433f0059d5 |
x86_64 | |
autofs-4.1.3-199.3.x86_64.rpm | SHA-256: 64577ca5167907920579040682c6787061470edab6c7d85daf9e5c88ab1c2de3 |
i386 | |
autofs-4.1.3-199.3.i386.rpm | SHA-256: a3f4680427536eb087a972f6bfd5954460d95b8092230ad9288aae785f91028f |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
autofs-4.1.3-199.3.src.rpm | SHA-256: a7b39daa9434e0f89f8179e5a3c45da4376dc1d42cb858b6c650ce433f0059d5 |
s390x | |
autofs-4.1.3-199.3.s390x.rpm | SHA-256: f4a62595fc8c8b7ffd5f3b9c50b92bc877eb05947f45058f7b219e9afe530579 |
s390 | |
autofs-4.1.3-199.3.s390.rpm | SHA-256: c05d153e955a34a9f909a3e5e3e982b6e0a434777f74fb19982dbaa21bd78fb0 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
autofs-4.1.3-199.3.src.rpm | SHA-256: a7b39daa9434e0f89f8179e5a3c45da4376dc1d42cb858b6c650ce433f0059d5 |
ppc | |
autofs-4.1.3-199.3.ppc.rpm | SHA-256: 870387f45ee902f343f686e05b4d90f3b247dc2a9ad8c89428b899885e382d6a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.