- Issued:
- 2013-09-30
- Updated:
- 2013-09-30
RHBA-2013:1349 - Bug Fix Advisory
Synopsis
am-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated am-utils packages that fix two bugs are now available for Red Hat
Enterprise Linux 5.
Description
The am-utils packages provide the BSD automounter, Amd, which maintains a cache
of mounted file systems. File systems are mounted when they are first referenced
by a user, and unmounted after a period of inactivity.
This update fixes the following bugs:
- Previously, the BSD automounter ignored the NFS "noacl" mount option, which
disables ACL (Access Control List) support on NFS shares. Local file systems
such as ext3 do not have ACLs enabled unless the "acl" mount option is supplied.
An attempt to use the setfacl utility or another ACL operation on a share that
had "noacl" specified was supposed to result in an "Operation not supported"
error, but it did not. With this update, a backported patch has been provided
and the "noacl" option is supported as expected. (BZ#836359)
- When using an autofs multi-level mount map amd failed to umount
NFS leaf mounts causing shutdown to terminate unexpectedly. This was caused by
the background umount of NFS mounts at the leaf of the tree not finishing before
the autofs file system mounts above were attempted. As a consequence, the system
became unresponsive during shutdown. With this update, a patch has been provided
to fix this bug and the system no longer becomes unresponsive in this scenario.
(BZ#862283)
Users of am-utils are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
am-utils-6.1.5-7.el5.src.rpm | SHA-256: 4e9a68d102dd780ba1369b1970eb0894e07860daeae41b5803c9c4a855c27741 |
x86_64 | |
am-utils-6.1.5-7.el5.x86_64.rpm | SHA-256: 25f648b3bc8fddf22562fdadb9213145216081969e7f5fac7e6b934e43a32bca |
am-utils-debuginfo-6.1.5-7.el5.x86_64.rpm | SHA-256: aa73754dbbe1c0e231112a63356ef74097703e235155eb380bada153b8278868 |
ia64 | |
am-utils-6.1.5-7.el5.ia64.rpm | SHA-256: 201d8903ebca23730ef343eb37ee44e3624f7762178d9c489a986bfed51ddc87 |
am-utils-debuginfo-6.1.5-7.el5.ia64.rpm | SHA-256: 5951a2bdf81d57f8621e7d7bee37c4be6cd41c29ea0775ec82dc82edcdbfe176 |
i386 | |
am-utils-6.1.5-7.el5.i386.rpm | SHA-256: e9f2ea9041b66c4068589b77ba41e2f8418ecebbf99898b09909d773e50988bd |
am-utils-debuginfo-6.1.5-7.el5.i386.rpm | SHA-256: 13d422474e806a2bb6a814383223fe0c1166faaf98a6e372686c1b1956eaeac5 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
am-utils-6.1.5-7.el5.src.rpm | SHA-256: 4e9a68d102dd780ba1369b1970eb0894e07860daeae41b5803c9c4a855c27741 |
x86_64 | |
am-utils-6.1.5-7.el5.x86_64.rpm | SHA-256: 25f648b3bc8fddf22562fdadb9213145216081969e7f5fac7e6b934e43a32bca |
am-utils-debuginfo-6.1.5-7.el5.x86_64.rpm | SHA-256: aa73754dbbe1c0e231112a63356ef74097703e235155eb380bada153b8278868 |
i386 | |
am-utils-6.1.5-7.el5.i386.rpm | SHA-256: e9f2ea9041b66c4068589b77ba41e2f8418ecebbf99898b09909d773e50988bd |
am-utils-debuginfo-6.1.5-7.el5.i386.rpm | SHA-256: 13d422474e806a2bb6a814383223fe0c1166faaf98a6e372686c1b1956eaeac5 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
am-utils-6.1.5-7.el5.src.rpm | SHA-256: 4e9a68d102dd780ba1369b1970eb0894e07860daeae41b5803c9c4a855c27741 |
x86_64 | |
am-utils-6.1.5-7.el5.x86_64.rpm | SHA-256: 25f648b3bc8fddf22562fdadb9213145216081969e7f5fac7e6b934e43a32bca |
am-utils-debuginfo-6.1.5-7.el5.x86_64.rpm | SHA-256: aa73754dbbe1c0e231112a63356ef74097703e235155eb380bada153b8278868 |
i386 | |
am-utils-6.1.5-7.el5.i386.rpm | SHA-256: e9f2ea9041b66c4068589b77ba41e2f8418ecebbf99898b09909d773e50988bd |
am-utils-debuginfo-6.1.5-7.el5.i386.rpm | SHA-256: 13d422474e806a2bb6a814383223fe0c1166faaf98a6e372686c1b1956eaeac5 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
am-utils-6.1.5-7.el5.src.rpm | SHA-256: 4e9a68d102dd780ba1369b1970eb0894e07860daeae41b5803c9c4a855c27741 |
s390x | |
am-utils-6.1.5-7.el5.s390x.rpm | SHA-256: 7683a7a217d1008fe8ecf9759695c13ccd6beeae79694382a2efae816faa2abe |
am-utils-debuginfo-6.1.5-7.el5.s390x.rpm | SHA-256: c565718771a81339d52a482250ab20b5c16ed508009f7a9436cf04e5f55c833a |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
am-utils-6.1.5-7.el5.src.rpm | SHA-256: 4e9a68d102dd780ba1369b1970eb0894e07860daeae41b5803c9c4a855c27741 |
ppc | |
am-utils-6.1.5-7.el5.ppc.rpm | SHA-256: 081be9b6f576a5d241c94d8837c5bc63074cb1d861a5f3eb91eaa2d537644fb9 |
am-utils-debuginfo-6.1.5-7.el5.ppc.rpm | SHA-256: 7ef93268cc4fb602953b80bb00ed3398c3bc414d5c99e602ac9b976cbbce9454 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
am-utils-6.1.5-7.el5.src.rpm | SHA-256: 4e9a68d102dd780ba1369b1970eb0894e07860daeae41b5803c9c4a855c27741 |
x86_64 | |
am-utils-6.1.5-7.el5.x86_64.rpm | SHA-256: 25f648b3bc8fddf22562fdadb9213145216081969e7f5fac7e6b934e43a32bca |
am-utils-debuginfo-6.1.5-7.el5.x86_64.rpm | SHA-256: aa73754dbbe1c0e231112a63356ef74097703e235155eb380bada153b8278868 |
i386 | |
am-utils-6.1.5-7.el5.i386.rpm | SHA-256: e9f2ea9041b66c4068589b77ba41e2f8418ecebbf99898b09909d773e50988bd |
am-utils-debuginfo-6.1.5-7.el5.i386.rpm | SHA-256: 13d422474e806a2bb6a814383223fe0c1166faaf98a6e372686c1b1956eaeac5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.