Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2013:1064 - Bug Fix Advisory
Issued:
2013-07-15
Updated:
2013-07-15

RHBA-2013:1064 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat Storage 2.0 enhancement and bug fix update #5

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated glusterfs, vdsm, gluster-swift, appliance, and rhs-c packages that fix
several bugs are now available for Red Hat Storage 2.0.

Description

Red Hat Storage is software only, scale-out storage that provides flexible and
affordable unstructured data storage for the enterprise.

Bug Fixes:

  • The format of the internal key used to identify a fully qualified domain name

(FQDN) based hostname was not complied by the parser and the NFS mounts failed
when a client with FQDN based hostname was mounted. This issue is now fixed to
comply with the parser and the NFS mount works.(BZ#906119)

  • The option to disable root-squash was not executed properly in server protocol

module and root-squash could not be disabled when the volume was up. Now, the
option to disable the root-squash is executed in the server-protocol and RPC
layer and an administrator can disable root-squash while the volume is
up.(BZ#964032)

  • When a volume is enabled with root-squash, all the internal/trusted clients

must be allowed to bypass the root-squash check. Daemons such as self-heal are
passed through root-squash check. Now, there is a mechanism to distinguish the
clients which are trusted and root-squash check is not performed on those client
processes.(BZ#961492)

  • In quick-read translator, the uid/gid of a user was not copied correctly to

the filesystem operations made to the server, thus enabling root-squash on those
operations. Non-root users who did not fall under root-squash were also treated
as nobody:nobody, thus breaking the POSIX-compliance.This issue is now fixed and
the root-squash behavior is consistent with the standards.(BZ#961491)

  • glusterd init/service scripts did not create a lockfile while starting the

process. Hence, during a reboot, glusterd process was not stopped automatically.
Now, locking and unlocking mechanism have been added in glusterd init script and
during reboot, glusterd service stops properly. (BZ#958666)

  • The VDSM in Red Hat Storage 2.0 Update 4 node had Secure Sockets Layer (SSL)

enabled but was set to false for communication in the Red Hat Storage Console.
Hence, add server failed with a SocketException error. Now, the VDSM is
configured to false. After installing VDSM, stop, reconfigure and start the VDSM
service to successfully add a server in the Red Hat Storage Console.(BZ#928311)

  • VDSM in Red Hat Storage 2.0 Update 4 node reported cluster compatibility level

3.1/3.2 while the Red Hat Storage Console required compatibility level 2.0.
Hence, a Red Hat Storage 2.0 Update 4 node could not be added using the Red Hat
Storage Console.The VDSM was modified to support cluster compatibility level
2.0. Now, adding a Red Hat Storage 2.0 Update 4 node using the Red Hat Storage
Console is successful.(BZ#924193)

  • The Jboss EAP version available in channel has been updated to 6.1 from 6.0.

Hence, Red Hat Storage Console installation fails. Now, the setup scripts is
updated to reflect the correct location of Jboss files needed during
installation and the installation is successful.(BZ#966864)

  • While adding a Red Hat Storage Update 4 node to Red Hat Storage Console,

vdsm-gluster package failed to install due to an error in the Gluster Package
Bootstrap component of VDSM. Now, the VDSM bootstrap component is modified and
adding a Red Hat Storage node is successful.(BZ#963676)

  • Changelogs in synchronous replication could become incorrect following an

ungraceful shutdown of xfs resulting in files not being self-healed or let
unreliable self-heal happen, which can lead to potential data corruption. The
process of updating changelogs has been made resilient to avoid this
inconsistency.(BZ#973922)

  • Installing or upgrading the gluster-swift-plugin RPM overwrites /etc/swift

configuration files. Hence, the customer configuration is overwritten, causing
data unavailability. Now, the RPM installs or upgrades new configuration files
with a non-conflicting extension and customer configuration files are not
overwritten, maintaining data availability.(BZ#969224)

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Gluster Storage Server for On-premise 2.0 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
  • Red Hat Gluster Storage Management Console (for RHEL Server) 2.0 x86_64

Fixes

  • BZ - 924193 - [RHS-C] Unable to add the latest RHS 2.0+ host in RHS-C due to compatibility issues
  • BZ - 963676 - [RHSC] Add host failure (RHS Anshi node to rhsc-2.0.techpreview1-4.el6rhs.noarch)
  • BZ - 964032 - root-squash: root-squashing does not get disabled dynamically
  • BZ - 966864 - The latest rhsc-setup fails
  • BZ - 977250 - running dbench results in leaked fds leading to OOM killer killing glusterfsd.
  • BZ - 978802 - Client crashed on hypervisor after rebalance on a distributed-replicate volume

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Gluster Storage Server for On-premise 2.0

SRPM
appliance-1.7.1-3.el6rhs.src.rpm SHA-256: 8bec91d0a6f1a02cf366097db68151fd58aa8e0a2f7d37b4e3a97cf5eff4d864
glusterfs-3.3.0.11rhs-1.el6rhs.src.rpm SHA-256: fe5b7868aafb386bec1afa8c2b57ceee1be18689f18c0be908988d1b5d2590fb
vdsm-4.9.6-23.el6rhs.src.rpm SHA-256: 1d0a745a1f9abd67b085ae6fb72fa1b0c8eca9f7d018f0e33655d9239742616b
x86_64
appliance-base-1.7.1-3.el6rhs.noarch.rpm SHA-256: 12294db89df6ed8931725c6866d11feeaed20412d3ad86c2ceb478bdba4a8cb3
glusterfs-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: c5e332c12eabb10f7d4234af2f5ae6d2579367e5548727ff962d33dbd659d1d8
glusterfs-debuginfo-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 7b35039f8db2e2acd0322223623b1332f397429572fa88fba2f2d64571d55131
glusterfs-devel-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 610c6441ac23a17f989b543c6340d620cbfd6735164127a8df207c0fa5580fae
glusterfs-fuse-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 390554c3c7cad4bd9fac92abdc4a1dc8afd6f11a0b5a94860685a9470750d5de
glusterfs-geo-replication-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: a3614b83b6507ae268adf5222b32a558e183a9b120439e022059b88045d30601
glusterfs-rdma-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 9f2bb81f1a71561fdc4c2749bbe52e1d49b2e88a12c7b77b672a437498916739
glusterfs-server-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 767f244424af37201f5b90fcb0e7fbe16a968c7297f364ed8f9975a7bdfb0d0f
vdsm-4.9.6-23.el6rhs.x86_64.rpm SHA-256: 0dfcba7045886d2fe15a1a3604d962b7e3c46934b0393416edd0931177b7b0a4
vdsm-bootstrap-4.9.6-23.el6rhs.noarch.rpm SHA-256: 7ec328d7b51452dfa11c81b8f96146f3adde44a644bad74991395f8694673db5
vdsm-cli-4.9.6-23.el6rhs.noarch.rpm SHA-256: 9d5acfc7d90351c23eb7e966174d13ade42678e1dbe36eafde3e48231c580cd9
vdsm-debug-plugin-4.9.6-23.el6rhs.noarch.rpm SHA-256: c9088b6dac31b49ba1184e5442d170c87eeac57c14beff461797d2d9540ad877
vdsm-debuginfo-4.9.6-23.el6rhs.x86_64.rpm SHA-256: 5ebdc36c928de2eb1513742475251db3750a161d1b4e3ef1bfef2c4d61013e45
vdsm-gluster-4.9.6-23.el6rhs.noarch.rpm SHA-256: cb92198976383cee5b9d25a3f755b9bbea7ebde9e3148b749b0329787bd967cb
vdsm-hook-faqemu-4.9.6-23.el6rhs.noarch.rpm SHA-256: 0b4c7afcc546a7fa13d443b743c6642884217e17ce8995e544df756b5a703476
vdsm-hook-vhostmd-4.9.6-23.el6rhs.noarch.rpm SHA-256: d70ba2cb4331d5602d2d5938b5fab7166c0a6c7294245b0cf11cd913d47cd798
vdsm-python-4.9.6-23.el6rhs.x86_64.rpm SHA-256: bf10723e0094604aebac0a17e8bb6167f44f8d4f9b2e794c9f946760c30dd814
vdsm-reg-4.9.6-23.el6rhs.noarch.rpm SHA-256: d14462516735513927968bbe56602b2647aca682d63f779aa714c8e217707703

Red Hat Storage for Public Cloud (via RHUI) 2.0

SRPM
appliance-1.7.1-3.el6rhs.src.rpm SHA-256: 8bec91d0a6f1a02cf366097db68151fd58aa8e0a2f7d37b4e3a97cf5eff4d864
glusterfs-3.3.0.11rhs-1.el6rhs.src.rpm SHA-256: fe5b7868aafb386bec1afa8c2b57ceee1be18689f18c0be908988d1b5d2590fb
vdsm-4.9.6-23.el6rhs.src.rpm SHA-256: 1d0a745a1f9abd67b085ae6fb72fa1b0c8eca9f7d018f0e33655d9239742616b
x86_64
appliance-base-1.7.1-3.el6rhs.noarch.rpm SHA-256: 12294db89df6ed8931725c6866d11feeaed20412d3ad86c2ceb478bdba4a8cb3
glusterfs-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: c5e332c12eabb10f7d4234af2f5ae6d2579367e5548727ff962d33dbd659d1d8
glusterfs-debuginfo-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 7b35039f8db2e2acd0322223623b1332f397429572fa88fba2f2d64571d55131
glusterfs-devel-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 610c6441ac23a17f989b543c6340d620cbfd6735164127a8df207c0fa5580fae
glusterfs-fuse-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 390554c3c7cad4bd9fac92abdc4a1dc8afd6f11a0b5a94860685a9470750d5de
glusterfs-geo-replication-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: a3614b83b6507ae268adf5222b32a558e183a9b120439e022059b88045d30601
glusterfs-rdma-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 9f2bb81f1a71561fdc4c2749bbe52e1d49b2e88a12c7b77b672a437498916739
glusterfs-server-3.3.0.11rhs-1.el6rhs.x86_64.rpm SHA-256: 767f244424af37201f5b90fcb0e7fbe16a968c7297f364ed8f9975a7bdfb0d0f
vdsm-4.9.6-23.el6rhs.x86_64.rpm SHA-256: 0dfcba7045886d2fe15a1a3604d962b7e3c46934b0393416edd0931177b7b0a4
vdsm-bootstrap-4.9.6-23.el6rhs.noarch.rpm SHA-256: 7ec328d7b51452dfa11c81b8f96146f3adde44a644bad74991395f8694673db5
vdsm-cli-4.9.6-23.el6rhs.noarch.rpm SHA-256: 9d5acfc7d90351c23eb7e966174d13ade42678e1dbe36eafde3e48231c580cd9
vdsm-debug-plugin-4.9.6-23.el6rhs.noarch.rpm SHA-256: c9088b6dac31b49ba1184e5442d170c87eeac57c14beff461797d2d9540ad877
vdsm-debuginfo-4.9.6-23.el6rhs.x86_64.rpm SHA-256: 5ebdc36c928de2eb1513742475251db3750a161d1b4e3ef1bfef2c4d61013e45
vdsm-gluster-4.9.6-23.el6rhs.noarch.rpm SHA-256: cb92198976383cee5b9d25a3f755b9bbea7ebde9e3148b749b0329787bd967cb
vdsm-hook-faqemu-4.9.6-23.el6rhs.noarch.rpm SHA-256: 0b4c7afcc546a7fa13d443b743c6642884217e17ce8995e544df756b5a703476
vdsm-hook-vhostmd-4.9.6-23.el6rhs.noarch.rpm SHA-256: d70ba2cb4331d5602d2d5938b5fab7166c0a6c7294245b0cf11cd913d47cd798
vdsm-python-4.9.6-23.el6rhs.x86_64.rpm SHA-256: bf10723e0094604aebac0a17e8bb6167f44f8d4f9b2e794c9f946760c30dd814
vdsm-reg-4.9.6-23.el6rhs.noarch.rpm SHA-256: d14462516735513927968bbe56602b2647aca682d63f779aa714c8e217707703

Red Hat Gluster Storage Management Console (for RHEL Server) 2.0

SRPM
rhsc-2.0.techpreview1-5.el6rhs.src.rpm SHA-256: a05bbf00660a9ec145f4302e8cc2583cb9b96df742c15a4bf14904d5beaadade
vdsm-4.9.6-23.el6rhs.src.rpm SHA-256: 1d0a745a1f9abd67b085ae6fb72fa1b0c8eca9f7d018f0e33655d9239742616b
x86_64
rhsc-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 3744b2cc7f09044fe24c074b8a475f070d855923fa657eb92d18568d64fc1dcc
rhsc-backend-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 88b497b7c913f2b70b08a83f045e55c6d19c36ba7ca62e7b66e3e0d02b6c5871
rhsc-config-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 5a52f31ac8c02c585eeeb0451abd705910d8888aecbd823586d4a9896bc6ceda
rhsc-dbscripts-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: be62189632e0f96d51175ecb14c5dc6479238a2f3fcace318536eb85d02cfaba
rhsc-genericapi-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 692ba7149661d9d53aad2cb6dc7bb8ff848e1ee1fdb5886aa162a349abcb575e
rhsc-jboss-deps-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 8ce12e1eb5c873d784a23cb9f7f497618e2be204a7501cfe1b20e47162ce3106
rhsc-notification-service-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 2038971315ac424e33c0920dd9a000ca3a730d8db69942ce9d4ac7e8c820a017
rhsc-restapi-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 2b12c0f4f69836c664bd4866c02987392ff225b9adb56348d4b8c8e6285ab539
rhsc-setup-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 874887df5c0cfded14d5a49c75b1b67f4319c9667b3c45dd2c8cad79344605fd
rhsc-tools-common-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 62ed512fbb223dd2d2726a2dcebe3539c96170cbb200c10d1871897749c7cf1c
rhsc-userportal-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: 6dcc1dfa4641dd548d47e9d71393402d9b3c0ebbeaa847cac9ab4f9b8e6da764
rhsc-webadmin-portal-2.0.techpreview1-5.el6rhs.noarch.rpm SHA-256: bc6d0c98a1a0a2151c145af2acced0f852f41b069bf9405f59c9ae32444f9b8d
vdsm-bootstrap-4.9.6-23.el6rhs.noarch.rpm SHA-256: 7ec328d7b51452dfa11c81b8f96146f3adde44a644bad74991395f8694673db5

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility