Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2014:1234 - Bug Fix Advisory
Issued:
2014-09-16
Updated:
2014-09-16

RHBA-2014:1234 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

gfs-kmod bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gfs-kmod packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

Description

The gfs-kmod packages contain modules that provide the ability to mount and use
Global File System (GFS).

This update fixes the following bug:

  • Previously, the gfs utility was not synchronizing the inode attributes to disk

along with the data for shared mmap() writes. Consequently, files did not have
their mtime (modification time) value updated. With this update, gfs writes the
inode time stamps to disk when the msync() function is called, and gfs now
synchronizes the inode attributes to disk as intended. (BZ#1066181)

Users of gfs-kmod are advised to upgrade to these updated packages, which fix
this bug.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
  • Red Hat Enterprise Linux Resilient Storage for x86_64 5 ppc
  • Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
  • Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386

Fixes

  • BZ - 1066181 - GFS not syncing inode mtime before freeze

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Resilient Storage for x86_64 5

SRPM
gfs-kmod-0.1.34-22.el5.src.rpm SHA-256: f967af52262e65168a2d373255a359226bcf45c25723441eff7e96d4cb028ada
x86_64
gfs-kmod-debuginfo-0.1.34-22.el5.x86_64.rpm SHA-256: c75d3a8c9ee982ef62d6ec5bcf5300f58a0d062b331a1095b86e8ea336e7b403
kmod-gfs-0.1.34-22.el5.x86_64.rpm SHA-256: 691dfe3bbf4f95d289be4d31764150d7562fee93931bed483b21760acc355424
kmod-gfs-xen-0.1.34-22.el5.x86_64.rpm SHA-256: 9f3e3f314cc601d308a1959340a84a4915d41db5dd10c08b59e9c0e7a3b97a59
ppc
gfs-kmod-debuginfo-0.1.34-22.el5.ppc64.rpm SHA-256: 1de44d706b7e7f1fd33f96b157499e517b6840beb5360a995fcb500a4e70da45
kmod-gfs-0.1.34-22.el5.ppc64.rpm SHA-256: b60bd8248226320388d01c9892d7e04392e6911d7b71a178a1b841de793109db
ia64
gfs-kmod-debuginfo-0.1.34-22.el5.ia64.rpm SHA-256: 21f2920162900ffac5bf21a26131eca4f2d43b86b910daa6bdeccff3dc794fb4
kmod-gfs-0.1.34-22.el5.ia64.rpm SHA-256: acbd4b52bcbaf4d61c8ebb83c85ba02b6e95d63fa6ce753e647536b118d5520d
kmod-gfs-xen-0.1.34-22.el5.ia64.rpm SHA-256: 19f7592f6fec05b0e1be899abbd0ff8e4d6a52c47a483a9791766556266eaad4
i386
gfs-kmod-debuginfo-0.1.34-22.el5.i686.rpm SHA-256: e9ea2175c3b54da24961d23510b9ab04d4d1573eb7bf91ded2ae2b9a97a7f77b
kmod-gfs-0.1.34-22.el5.i686.rpm SHA-256: a853bfeaa95446a323f8fe4e9edf497d4e94693a4f166a1bd97fd0a9da7d50b8
kmod-gfs-PAE-0.1.34-22.el5.i686.rpm SHA-256: f5288a98b7eea8c56fe5e380ffc45358320a54aed1b49256c6dd08df2b7ba74d
kmod-gfs-xen-0.1.34-22.el5.i686.rpm SHA-256: b32b3f496702da0e06259d6d7f52d2585fcb2c75f49bcce940081ee883266603

Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5

SRPM
gfs-kmod-0.1.34-22.el5.src.rpm SHA-256: f967af52262e65168a2d373255a359226bcf45c25723441eff7e96d4cb028ada
x86_64
gfs-kmod-debuginfo-0.1.34-22.el5.x86_64.rpm SHA-256: c75d3a8c9ee982ef62d6ec5bcf5300f58a0d062b331a1095b86e8ea336e7b403
kmod-gfs-0.1.34-22.el5.x86_64.rpm SHA-256: 691dfe3bbf4f95d289be4d31764150d7562fee93931bed483b21760acc355424
kmod-gfs-xen-0.1.34-22.el5.x86_64.rpm SHA-256: 9f3e3f314cc601d308a1959340a84a4915d41db5dd10c08b59e9c0e7a3b97a59
i386
gfs-kmod-debuginfo-0.1.34-22.el5.i686.rpm SHA-256: e9ea2175c3b54da24961d23510b9ab04d4d1573eb7bf91ded2ae2b9a97a7f77b
kmod-gfs-0.1.34-22.el5.i686.rpm SHA-256: a853bfeaa95446a323f8fe4e9edf497d4e94693a4f166a1bd97fd0a9da7d50b8
kmod-gfs-PAE-0.1.34-22.el5.i686.rpm SHA-256: f5288a98b7eea8c56fe5e380ffc45358320a54aed1b49256c6dd08df2b7ba74d
kmod-gfs-xen-0.1.34-22.el5.i686.rpm SHA-256: b32b3f496702da0e06259d6d7f52d2585fcb2c75f49bcce940081ee883266603

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Diversity, equity, and inclusion
  • Cool Stuff Store
  • Red Hat Summit
© 2024 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility