- Issued:
- 2013-07-15
- Updated:
- 2013-07-15
RHBA-2013:1064 - Bug Fix Advisory
Synopsis
Red Hat Storage 2.0 enhancement and bug fix update #5
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated glusterfs, vdsm, gluster-swift, appliance, and rhs-c packages that fix
several bugs are now available for Red Hat Storage 2.0.
Description
Red Hat Storage is software only, scale-out storage that provides flexible and
affordable unstructured data storage for the enterprise.
Bug Fixes:
- The format of the internal key used to identify a fully qualified domain name
(FQDN) based hostname was not complied by the parser and the NFS mounts failed
when a client with FQDN based hostname was mounted. This issue is now fixed to
comply with the parser and the NFS mount works.(BZ#906119)
- The option to disable root-squash was not executed properly in server protocol
module and root-squash could not be disabled when the volume was up. Now, the
option to disable the root-squash is executed in the server-protocol and RPC
layer and an administrator can disable root-squash while the volume is
up.(BZ#964032)
- When a volume is enabled with root-squash, all the internal/trusted clients
must be allowed to bypass the root-squash check. Daemons such as self-heal are
passed through root-squash check. Now, there is a mechanism to distinguish the
clients which are trusted and root-squash check is not performed on those client
processes.(BZ#961492)
- In quick-read translator, the uid/gid of a user was not copied correctly to
the filesystem operations made to the server, thus enabling root-squash on those
operations. Non-root users who did not fall under root-squash were also treated
as nobody:nobody, thus breaking the POSIX-compliance.This issue is now fixed and
the root-squash behavior is consistent with the standards.(BZ#961491)
- glusterd init/service scripts did not create a lockfile while starting the
process. Hence, during a reboot, glusterd process was not stopped automatically.
Now, locking and unlocking mechanism have been added in glusterd init script and
during reboot, glusterd service stops properly. (BZ#958666)
- The VDSM in Red Hat Storage 2.0 Update 4 node had Secure Sockets Layer (SSL)
enabled but was set to false for communication in the Red Hat Storage Console.
Hence, add server failed with a SocketException error. Now, the VDSM is
configured to false. After installing VDSM, stop, reconfigure and start the VDSM
service to successfully add a server in the Red Hat Storage Console.(BZ#928311)
- VDSM in Red Hat Storage 2.0 Update 4 node reported cluster compatibility level
3.1/3.2 while the Red Hat Storage Console required compatibility level 2.0.
Hence, a Red Hat Storage 2.0 Update 4 node could not be added using the Red Hat
Storage Console.The VDSM was modified to support cluster compatibility level
2.0. Now, adding a Red Hat Storage 2.0 Update 4 node using the Red Hat Storage
Console is successful.(BZ#924193)
- The Jboss EAP version available in channel has been updated to 6.1 from 6.0.
Hence, Red Hat Storage Console installation fails. Now, the setup scripts is
updated to reflect the correct location of Jboss files needed during
installation and the installation is successful.(BZ#966864)
- While adding a Red Hat Storage Update 4 node to Red Hat Storage Console,
vdsm-gluster package failed to install due to an error in the Gluster Package
Bootstrap component of VDSM. Now, the VDSM bootstrap component is modified and
adding a Red Hat Storage node is successful.(BZ#963676)
- Changelogs in synchronous replication could become incorrect following an
ungraceful shutdown of xfs resulting in files not being self-healed or let
unreliable self-heal happen, which can lead to potential data corruption. The
process of updating changelogs has been made resilient to avoid this
inconsistency.(BZ#973922)
- Installing or upgrading the gluster-swift-plugin RPM overwrites /etc/swift
configuration files. Hence, the customer configuration is overwritten, causing
data unavailability. Now, the RPM installs or upgrades new configuration files
with a non-conflicting extension and customer configuration files are not
overwritten, maintaining data availability.(BZ#969224)
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Gluster Storage Server for On-premise 2.0 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
- Red Hat Gluster Storage Management Console (for RHEL Server) 2.0 x86_64
Fixes
- BZ - 924193 - [RHS-C] Unable to add the latest RHS 2.0+ host in RHS-C due to compatibility issues
- BZ - 963676 - [RHSC] Add host failure (RHS Anshi node to rhsc-2.0.techpreview1-4.el6rhs.noarch)
- BZ - 964032 - root-squash: root-squashing does not get disabled dynamically
- BZ - 966864 - The latest rhsc-setup fails
- BZ - 977250 - running dbench results in leaked fds leading to OOM killer killing glusterfsd.
- BZ - 978802 - Client crashed on hypervisor after rebalance on a distributed-replicate volume
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 2.0
SRPM | |
---|---|
appliance-1.7.1-3.el6rhs.src.rpm | SHA-256: 8bec91d0a6f1a02cf366097db68151fd58aa8e0a2f7d37b4e3a97cf5eff4d864 |
glusterfs-3.3.0.11rhs-1.el6rhs.src.rpm | SHA-256: fe5b7868aafb386bec1afa8c2b57ceee1be18689f18c0be908988d1b5d2590fb |
vdsm-4.9.6-23.el6rhs.src.rpm | SHA-256: 1d0a745a1f9abd67b085ae6fb72fa1b0c8eca9f7d018f0e33655d9239742616b |
x86_64 | |
appliance-base-1.7.1-3.el6rhs.noarch.rpm | SHA-256: 12294db89df6ed8931725c6866d11feeaed20412d3ad86c2ceb478bdba4a8cb3 |
glusterfs-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: c5e332c12eabb10f7d4234af2f5ae6d2579367e5548727ff962d33dbd659d1d8 |
glusterfs-debuginfo-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 7b35039f8db2e2acd0322223623b1332f397429572fa88fba2f2d64571d55131 |
glusterfs-devel-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 610c6441ac23a17f989b543c6340d620cbfd6735164127a8df207c0fa5580fae |
glusterfs-fuse-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 390554c3c7cad4bd9fac92abdc4a1dc8afd6f11a0b5a94860685a9470750d5de |
glusterfs-geo-replication-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: a3614b83b6507ae268adf5222b32a558e183a9b120439e022059b88045d30601 |
glusterfs-rdma-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 9f2bb81f1a71561fdc4c2749bbe52e1d49b2e88a12c7b77b672a437498916739 |
glusterfs-server-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 767f244424af37201f5b90fcb0e7fbe16a968c7297f364ed8f9975a7bdfb0d0f |
vdsm-4.9.6-23.el6rhs.x86_64.rpm | SHA-256: 0dfcba7045886d2fe15a1a3604d962b7e3c46934b0393416edd0931177b7b0a4 |
vdsm-bootstrap-4.9.6-23.el6rhs.noarch.rpm | SHA-256: 7ec328d7b51452dfa11c81b8f96146f3adde44a644bad74991395f8694673db5 |
vdsm-cli-4.9.6-23.el6rhs.noarch.rpm | SHA-256: 9d5acfc7d90351c23eb7e966174d13ade42678e1dbe36eafde3e48231c580cd9 |
vdsm-debug-plugin-4.9.6-23.el6rhs.noarch.rpm | SHA-256: c9088b6dac31b49ba1184e5442d170c87eeac57c14beff461797d2d9540ad877 |
vdsm-debuginfo-4.9.6-23.el6rhs.x86_64.rpm | SHA-256: 5ebdc36c928de2eb1513742475251db3750a161d1b4e3ef1bfef2c4d61013e45 |
vdsm-gluster-4.9.6-23.el6rhs.noarch.rpm | SHA-256: cb92198976383cee5b9d25a3f755b9bbea7ebde9e3148b749b0329787bd967cb |
vdsm-hook-faqemu-4.9.6-23.el6rhs.noarch.rpm | SHA-256: 0b4c7afcc546a7fa13d443b743c6642884217e17ce8995e544df756b5a703476 |
vdsm-hook-vhostmd-4.9.6-23.el6rhs.noarch.rpm | SHA-256: d70ba2cb4331d5602d2d5938b5fab7166c0a6c7294245b0cf11cd913d47cd798 |
vdsm-python-4.9.6-23.el6rhs.x86_64.rpm | SHA-256: bf10723e0094604aebac0a17e8bb6167f44f8d4f9b2e794c9f946760c30dd814 |
vdsm-reg-4.9.6-23.el6rhs.noarch.rpm | SHA-256: d14462516735513927968bbe56602b2647aca682d63f779aa714c8e217707703 |
Red Hat Storage for Public Cloud (via RHUI) 2.0
SRPM | |
---|---|
appliance-1.7.1-3.el6rhs.src.rpm | SHA-256: 8bec91d0a6f1a02cf366097db68151fd58aa8e0a2f7d37b4e3a97cf5eff4d864 |
glusterfs-3.3.0.11rhs-1.el6rhs.src.rpm | SHA-256: fe5b7868aafb386bec1afa8c2b57ceee1be18689f18c0be908988d1b5d2590fb |
vdsm-4.9.6-23.el6rhs.src.rpm | SHA-256: 1d0a745a1f9abd67b085ae6fb72fa1b0c8eca9f7d018f0e33655d9239742616b |
x86_64 | |
appliance-base-1.7.1-3.el6rhs.noarch.rpm | SHA-256: 12294db89df6ed8931725c6866d11feeaed20412d3ad86c2ceb478bdba4a8cb3 |
glusterfs-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: c5e332c12eabb10f7d4234af2f5ae6d2579367e5548727ff962d33dbd659d1d8 |
glusterfs-debuginfo-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 7b35039f8db2e2acd0322223623b1332f397429572fa88fba2f2d64571d55131 |
glusterfs-devel-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 610c6441ac23a17f989b543c6340d620cbfd6735164127a8df207c0fa5580fae |
glusterfs-fuse-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 390554c3c7cad4bd9fac92abdc4a1dc8afd6f11a0b5a94860685a9470750d5de |
glusterfs-geo-replication-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: a3614b83b6507ae268adf5222b32a558e183a9b120439e022059b88045d30601 |
glusterfs-rdma-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 9f2bb81f1a71561fdc4c2749bbe52e1d49b2e88a12c7b77b672a437498916739 |
glusterfs-server-3.3.0.11rhs-1.el6rhs.x86_64.rpm | SHA-256: 767f244424af37201f5b90fcb0e7fbe16a968c7297f364ed8f9975a7bdfb0d0f |
vdsm-4.9.6-23.el6rhs.x86_64.rpm | SHA-256: 0dfcba7045886d2fe15a1a3604d962b7e3c46934b0393416edd0931177b7b0a4 |
vdsm-bootstrap-4.9.6-23.el6rhs.noarch.rpm | SHA-256: 7ec328d7b51452dfa11c81b8f96146f3adde44a644bad74991395f8694673db5 |
vdsm-cli-4.9.6-23.el6rhs.noarch.rpm | SHA-256: 9d5acfc7d90351c23eb7e966174d13ade42678e1dbe36eafde3e48231c580cd9 |
vdsm-debug-plugin-4.9.6-23.el6rhs.noarch.rpm | SHA-256: c9088b6dac31b49ba1184e5442d170c87eeac57c14beff461797d2d9540ad877 |
vdsm-debuginfo-4.9.6-23.el6rhs.x86_64.rpm | SHA-256: 5ebdc36c928de2eb1513742475251db3750a161d1b4e3ef1bfef2c4d61013e45 |
vdsm-gluster-4.9.6-23.el6rhs.noarch.rpm | SHA-256: cb92198976383cee5b9d25a3f755b9bbea7ebde9e3148b749b0329787bd967cb |
vdsm-hook-faqemu-4.9.6-23.el6rhs.noarch.rpm | SHA-256: 0b4c7afcc546a7fa13d443b743c6642884217e17ce8995e544df756b5a703476 |
vdsm-hook-vhostmd-4.9.6-23.el6rhs.noarch.rpm | SHA-256: d70ba2cb4331d5602d2d5938b5fab7166c0a6c7294245b0cf11cd913d47cd798 |
vdsm-python-4.9.6-23.el6rhs.x86_64.rpm | SHA-256: bf10723e0094604aebac0a17e8bb6167f44f8d4f9b2e794c9f946760c30dd814 |
vdsm-reg-4.9.6-23.el6rhs.noarch.rpm | SHA-256: d14462516735513927968bbe56602b2647aca682d63f779aa714c8e217707703 |
Red Hat Gluster Storage Management Console (for RHEL Server) 2.0
SRPM | |
---|---|
rhsc-2.0.techpreview1-5.el6rhs.src.rpm | SHA-256: a05bbf00660a9ec145f4302e8cc2583cb9b96df742c15a4bf14904d5beaadade |
vdsm-4.9.6-23.el6rhs.src.rpm | SHA-256: 1d0a745a1f9abd67b085ae6fb72fa1b0c8eca9f7d018f0e33655d9239742616b |
x86_64 | |
rhsc-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 3744b2cc7f09044fe24c074b8a475f070d855923fa657eb92d18568d64fc1dcc |
rhsc-backend-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 88b497b7c913f2b70b08a83f045e55c6d19c36ba7ca62e7b66e3e0d02b6c5871 |
rhsc-config-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 5a52f31ac8c02c585eeeb0451abd705910d8888aecbd823586d4a9896bc6ceda |
rhsc-dbscripts-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: be62189632e0f96d51175ecb14c5dc6479238a2f3fcace318536eb85d02cfaba |
rhsc-genericapi-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 692ba7149661d9d53aad2cb6dc7bb8ff848e1ee1fdb5886aa162a349abcb575e |
rhsc-jboss-deps-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 8ce12e1eb5c873d784a23cb9f7f497618e2be204a7501cfe1b20e47162ce3106 |
rhsc-notification-service-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 2038971315ac424e33c0920dd9a000ca3a730d8db69942ce9d4ac7e8c820a017 |
rhsc-restapi-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 2b12c0f4f69836c664bd4866c02987392ff225b9adb56348d4b8c8e6285ab539 |
rhsc-setup-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 874887df5c0cfded14d5a49c75b1b67f4319c9667b3c45dd2c8cad79344605fd |
rhsc-tools-common-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 62ed512fbb223dd2d2726a2dcebe3539c96170cbb200c10d1871897749c7cf1c |
rhsc-userportal-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: 6dcc1dfa4641dd548d47e9d71393402d9b3c0ebbeaa847cac9ab4f9b8e6da764 |
rhsc-webadmin-portal-2.0.techpreview1-5.el6rhs.noarch.rpm | SHA-256: bc6d0c98a1a0a2151c145af2acced0f852f41b069bf9405f59c9ae32444f9b8d |
vdsm-bootstrap-4.9.6-23.el6rhs.noarch.rpm | SHA-256: 7ec328d7b51452dfa11c81b8f96146f3adde44a644bad74991395f8694673db5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.