Skip to navigation

Bug Fix Advisory autofs5 bug fix update

Advisory: RHBA-2010:0626-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-08-12
Last updated on: 2010-08-12
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated autofs5 package that fixes a bug is now available for Red Hat
Enterprise Linux 5.

The autofs utility controls the operation of the automount daemon, which
automatically mounts, and then unmounts file systems after a period of
inactivity. File systems can include network file systems, CD-ROMs, diskettes,
and other media.

This updated autofs5 package fixes the following bugs:

* previously, when using client certificates with autofs the certificate DN
couldn't be used in LDAP ACLs. With this update, the SASL EXTERNAL
authentication mechanism is used for maping the certificate DN to an LDAP DN.
(bz#615258)

* previously, autofs could occasionally get suspended during expire of mounts
stage if there were many automount managed mounts. With this update, autofs runs
without suspension even with larger amounts of automount managed mounts.
(bz#615259)

All users of autofs5 are advised to upgrade to this updated package, which
resolves this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
autofs-5.0.1-0.rc2.143.el5_5.4.src.rpm
File outdated by:  RHBA-2013:1350
    MD5: ed198297f41fc1630f0bfc629b3cd5d0
SHA-256: 14dd24811e42a8a90ff0e9fbc469f3eef9a41dce4d39b3833392be882b5a20f6
 
IA-32:
autofs-5.0.1-0.rc2.143.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:1350
    MD5: cd2d153e9fb25ce37e07151f917d4990
SHA-256: 2fba28e46ef797d8adb2879490bc6a004f2e638bdf1ff90858691b5f8a6bd370
 
IA-64:
autofs-5.0.1-0.rc2.143.el5_5.4.ia64.rpm
File outdated by:  RHBA-2013:1350
    MD5: 7ec6f00f0030770ae0fe507a3a82b0cd
SHA-256: 7243374706630c318c6dd84502ccc2ec7b9d939b64abb6df3de908593a43a452
 
PPC:
autofs-5.0.1-0.rc2.143.el5_5.4.ppc.rpm
File outdated by:  RHBA-2013:1350
    MD5: 39d7006f48a311df7d6061dffb23f9ea
SHA-256: 9e8174fe9b56de52e7e545cd77a390552b40a24cf37d8f48e03335146decd031
 
s390x:
autofs-5.0.1-0.rc2.143.el5_5.4.s390x.rpm
File outdated by:  RHBA-2013:1350
    MD5: 54b3743cb06180c1990686778e1e1912
SHA-256: 3bcb096e17908a0a108cdfdfe854a7f0e4fa929c6a02be420a065a7b007fd287
 
x86_64:
autofs-5.0.1-0.rc2.143.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:1350
    MD5: dce57dbd0266e20a78f1ce2870552b82
SHA-256: d5ed2ea8d143cf0b3cb57f6278ad65746016c0337e337f9ae307bf6602db5d7d
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
autofs-5.0.1-0.rc2.143.el5_5.4.src.rpm
File outdated by:  RHBA-2013:1350
    MD5: ed198297f41fc1630f0bfc629b3cd5d0
SHA-256: 14dd24811e42a8a90ff0e9fbc469f3eef9a41dce4d39b3833392be882b5a20f6
 
IA-32:
autofs-5.0.1-0.rc2.143.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:1350
    MD5: cd2d153e9fb25ce37e07151f917d4990
SHA-256: 2fba28e46ef797d8adb2879490bc6a004f2e638bdf1ff90858691b5f8a6bd370
 
x86_64:
autofs-5.0.1-0.rc2.143.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:1350
    MD5: dce57dbd0266e20a78f1ce2870552b82
SHA-256: d5ed2ea8d143cf0b3cb57f6278ad65746016c0337e337f9ae307bf6602db5d7d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

615258 - include autofs support for SASL External authentication using certificates
615259 - Race condition or other deadlocking issue on expire code path



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/