Bug Fix Advisory am-utils bug fix update

Advisory: RHBA-2014:0198-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2014-02-24
Last updated on: 2014-02-24
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated am-utils packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

[Updated 25 February 2014]
This advisory has been updated with the correct description of the ENOENT
error. No changes have been made to the packages.

The am-utils packages provide the BSD automounter, Amd, which maintains a cache
of mounted file systems. File systems are mounted when they are first referenced
by a user, and unmounted after a period of inactivity.

This update fixes the following bug:

* Previously, the am-utils automount utility (amd) did not properly handle
possible "no such entity" error (ENOENT) returns when executing the umount
system calls on file systems mounted within the autofs file system. As a
consequence, amd terminated unexpectedly with a segmentation fault under
some circumstances. With this update, amd handles ENOENT returns as
expected, and the problem no longer occurs. (BZ#1065876)

Users of am-utils are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
am-utils-6.1.5-9.el5_10.src.rpm     MD5: 7e69af55fc278af64b5b9029752f9739
SHA-256: 3b453bf6b1f4f8ada6ccef623e3c0e1c0bcb8eefa0cda7a7ee2adbb3289f6d01
 
IA-32:
am-utils-6.1.5-9.el5_10.i386.rpm     MD5: bfbfe571cd45488731201ee05adbca86
SHA-256: 3ac86a03a141a66bffcda5f2e06d0188c14a393a81205c2dc682b9689a2c1016
am-utils-debuginfo-6.1.5-9.el5_10.i386.rpm     MD5: 471b2093d898b5f77ddea446954b230f
SHA-256: fc25fa338cebdcd1d3f93db9e94149af04fe9c733a1a58cce099ef2bc6baaf92
 
IA-64:
am-utils-6.1.5-9.el5_10.ia64.rpm     MD5: 0d43000c3a05c1d71275b53808e5feb5
SHA-256: 84d85a6ed7f648dde9039759e56d7600c766eb2377ecc9530b69050ad4ad3e36
am-utils-debuginfo-6.1.5-9.el5_10.ia64.rpm     MD5: 541c8e54f6cf2ea0192986ad50281972
SHA-256: 08b06e9e481abc1277c9b176e2a52a47ce1eed7bd11c9f5e9960908be40004f6
 
PPC:
am-utils-6.1.5-9.el5_10.ppc.rpm     MD5: 33cc6b82f9e185c5b7d5138161cec153
SHA-256: b012000fb59dc58af0efc1c09685f433e347b687fb8bc775656663cd07ca9bfb
am-utils-debuginfo-6.1.5-9.el5_10.ppc.rpm     MD5: b088e1664a5a4db63782718b7374f743
SHA-256: 94b7ca678b61ce6e5390cf91745b40eef0aa198f1936d5426c3fa45f02779c67
 
s390x:
am-utils-6.1.5-9.el5_10.s390x.rpm     MD5: 2d41adf0c3bb8494e9cc250c2ca01a3a
SHA-256: 5d97bedeecd85b16d4d038427a513f0c183511ebabf66c2fd37e634f2c2c9814
am-utils-debuginfo-6.1.5-9.el5_10.s390x.rpm     MD5: 324fbcffd75f602e6a95a536d6053729
SHA-256: f4d338f23cf0b1f38bed8d72f9b59ff082dc59a129482939f727e562c4befc5f
 
x86_64:
am-utils-6.1.5-9.el5_10.x86_64.rpm     MD5: 9b86b4971f4c0919ad9ef5ced76562ec
SHA-256: 6e1b3c1ee6f5498d2ad41121e29cdbfb29579b4971a059faf91d30a4d02de818
am-utils-debuginfo-6.1.5-9.el5_10.x86_64.rpm     MD5: e9edf708e7666c3ea317026b0111000a
SHA-256: ddcf6e137af34269dff1be6000456d94341849667a9c6e58711f145eda1a4459
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
am-utils-6.1.5-9.el5_10.src.rpm     MD5: 7e69af55fc278af64b5b9029752f9739
SHA-256: 3b453bf6b1f4f8ada6ccef623e3c0e1c0bcb8eefa0cda7a7ee2adbb3289f6d01
 
IA-32:
am-utils-6.1.5-9.el5_10.i386.rpm     MD5: bfbfe571cd45488731201ee05adbca86
SHA-256: 3ac86a03a141a66bffcda5f2e06d0188c14a393a81205c2dc682b9689a2c1016
am-utils-debuginfo-6.1.5-9.el5_10.i386.rpm     MD5: 471b2093d898b5f77ddea446954b230f
SHA-256: fc25fa338cebdcd1d3f93db9e94149af04fe9c733a1a58cce099ef2bc6baaf92
 
x86_64:
am-utils-6.1.5-9.el5_10.x86_64.rpm     MD5: 9b86b4971f4c0919ad9ef5ced76562ec
SHA-256: 6e1b3c1ee6f5498d2ad41121e29cdbfb29579b4971a059faf91d30a4d02de818
am-utils-debuginfo-6.1.5-9.el5_10.x86_64.rpm     MD5: e9edf708e7666c3ea317026b0111000a
SHA-256: ddcf6e137af34269dff1be6000456d94341849667a9c6e58711f145eda1a4459
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/