- Issued:
- 2014-10-13
- Updated:
- 2014-10-13
RHBA-2014:1599 - Bug Fix Advisory
Synopsis
scsi-target-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated scsi-target-utils packages that fix several bugs are now available for
Red Hat Enterprise Linux 6.
Description
The scsi-target-utils packages contain a daemon and utilities to setup Small
Computer System Interface (SCSI) targets. Currently, software Internet SCSI
(iSCSI) and iSCSI Extensions for RDMA (iSER) targets are supported.
This update fixes the following bugs:
- Previously, the tgtadm SCSI target administration utility did not correctly
handle backing-store errors. As a consequence, calling tgtadm with an invalid
backing-store parameter in some cases caused the tgtd service to become
unresponsive. With this update, the bug in tgtadm has been fixed, and tgtd now
recovers from an invalid request as intended. (BZ#848585)
- Prior to this update, tgtadm failed to handle setting a device to pass-through
mode. As a consequence, calling tgtadm with the device-type option set to
"passthrough" caused tgtd on the server side to terminate unexpectedly with a
segmentation fault. A patch has been applied to fix this bug, and tgtadm no
longer crashes in the described scenario. (BZ#854123)
- Prior to this update, running the "tgtadm --mode target --op show" command did
not return the complete number of targets if many targets were present on the
system. Consequently, tgtadm could show incorrect and also inconsistent results,
because the displayed number of targets varied over repeated attempts. A patch
has been applied to fix this bug. Running "tgtadm --mode target --op show" now
shows all the targets correctly even on systems with a large amount of targets.
(BZ#865960)
- Previously, scsi-target-utils did not support the "WRITE and VERIFY (10)" SCSI
command which is used by the AIX operating system. As a consequence, AIX failed
to execute the mkvg command when the user tried to add iSCSI targets to the
system. With this update, the support for "WRITE and VERIFY (10)" has been
added, and scsi-target-utils now provide iSCSI targets to AIX as expected.
(BZ#1094084)
- Previously, tgtd could experience a buffer overflow due to incorrect usage of
the snprintf() function in the source code. As a consequence, tgtd terminated
unexpectedly when trying to respond to a tgtadm query about a large number of
connections. The source code has been updated to avoid the buffer overflow, and
using tgtadm to display a large number of connections no longer causes tgtd to
crash. (BZ#1123438)
Users of scsi-target-utils are advised to upgrade to these updated packages,
which fix these bugs. All running scsi-target-utils services must be restarted
for the update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
- BZ - 848585 - tgtd hangs on recvfrom() after series of failed iscsi creation requests
- BZ - 865960 - "tgtadm --mode target --op show" shows incomplete data if there are many targets
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
scsi-target-utils-1.0.24-16.el6.src.rpm | SHA-256: c2b20c965fe9854e75aeaf97985a5d1365fac2dda6f9f09fbb2d0c03dc3b60bb |
x86_64 | |
scsi-target-utils-1.0.24-16.el6.x86_64.rpm | SHA-256: 5ac55e7967657f0d3243c845b777191f10b89c985a7591e0e7164350de03f8c7 |
scsi-target-utils-debuginfo-1.0.24-16.el6.x86_64.rpm | SHA-256: 088604520c2ee6c3f636359b29780cad4331fbd1486fe43b5a97618d404f4ec2 |
i386 | |
scsi-target-utils-1.0.24-16.el6.i686.rpm | SHA-256: 9af7f757072f26dc2acf981abe75be6860cde414d77c9b016a6abcbc33385bd9 |
scsi-target-utils-debuginfo-1.0.24-16.el6.i686.rpm | SHA-256: 290eb3d3fbb8a77b5837072fad5c753d4d041e26c321a2ead65cca28bc5369db |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
scsi-target-utils-1.0.24-16.el6.src.rpm | SHA-256: c2b20c965fe9854e75aeaf97985a5d1365fac2dda6f9f09fbb2d0c03dc3b60bb |
x86_64 | |
scsi-target-utils-1.0.24-16.el6.x86_64.rpm | SHA-256: 5ac55e7967657f0d3243c845b777191f10b89c985a7591e0e7164350de03f8c7 |
scsi-target-utils-debuginfo-1.0.24-16.el6.x86_64.rpm | SHA-256: 088604520c2ee6c3f636359b29780cad4331fbd1486fe43b5a97618d404f4ec2 |
i386 | |
scsi-target-utils-1.0.24-16.el6.i686.rpm | SHA-256: 9af7f757072f26dc2acf981abe75be6860cde414d77c9b016a6abcbc33385bd9 |
scsi-target-utils-debuginfo-1.0.24-16.el6.i686.rpm | SHA-256: 290eb3d3fbb8a77b5837072fad5c753d4d041e26c321a2ead65cca28bc5369db |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
scsi-target-utils-1.0.24-16.el6.src.rpm | SHA-256: c2b20c965fe9854e75aeaf97985a5d1365fac2dda6f9f09fbb2d0c03dc3b60bb |
x86_64 | |
scsi-target-utils-1.0.24-16.el6.x86_64.rpm | SHA-256: 5ac55e7967657f0d3243c845b777191f10b89c985a7591e0e7164350de03f8c7 |
scsi-target-utils-debuginfo-1.0.24-16.el6.x86_64.rpm | SHA-256: 088604520c2ee6c3f636359b29780cad4331fbd1486fe43b5a97618d404f4ec2 |
i386 | |
scsi-target-utils-1.0.24-16.el6.i686.rpm | SHA-256: 9af7f757072f26dc2acf981abe75be6860cde414d77c9b016a6abcbc33385bd9 |
scsi-target-utils-debuginfo-1.0.24-16.el6.i686.rpm | SHA-256: 290eb3d3fbb8a77b5837072fad5c753d4d041e26c321a2ead65cca28bc5369db |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
scsi-target-utils-1.0.24-16.el6.src.rpm | SHA-256: c2b20c965fe9854e75aeaf97985a5d1365fac2dda6f9f09fbb2d0c03dc3b60bb |
x86_64 | |
scsi-target-utils-1.0.24-16.el6.x86_64.rpm | SHA-256: 5ac55e7967657f0d3243c845b777191f10b89c985a7591e0e7164350de03f8c7 |
scsi-target-utils-debuginfo-1.0.24-16.el6.x86_64.rpm | SHA-256: 088604520c2ee6c3f636359b29780cad4331fbd1486fe43b5a97618d404f4ec2 |
i386 | |
scsi-target-utils-1.0.24-16.el6.i686.rpm | SHA-256: 9af7f757072f26dc2acf981abe75be6860cde414d77c9b016a6abcbc33385bd9 |
scsi-target-utils-debuginfo-1.0.24-16.el6.i686.rpm | SHA-256: 290eb3d3fbb8a77b5837072fad5c753d4d041e26c321a2ead65cca28bc5369db |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
scsi-target-utils-1.0.24-16.el6.src.rpm | SHA-256: c2b20c965fe9854e75aeaf97985a5d1365fac2dda6f9f09fbb2d0c03dc3b60bb |
ppc64 | |
scsi-target-utils-1.0.24-16.el6.ppc64.rpm | SHA-256: ee29d5c8335a18a13725d282b27f399697aaa154973503e9250d4ad54c77041a |
scsi-target-utils-debuginfo-1.0.24-16.el6.ppc64.rpm | SHA-256: 1678bce35b7029a7ac9a442a3bdcf90019e456aa5ec529a7ea20ae95968cf300 |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
scsi-target-utils-1.0.24-16.el6.src.rpm | SHA-256: c2b20c965fe9854e75aeaf97985a5d1365fac2dda6f9f09fbb2d0c03dc3b60bb |
x86_64 | |
scsi-target-utils-1.0.24-16.el6.x86_64.rpm | SHA-256: 5ac55e7967657f0d3243c845b777191f10b89c985a7591e0e7164350de03f8c7 |
scsi-target-utils-debuginfo-1.0.24-16.el6.x86_64.rpm | SHA-256: 088604520c2ee6c3f636359b29780cad4331fbd1486fe43b5a97618d404f4ec2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.