Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2015:0038 - Bug Fix Advisory
Issued:
2015-01-15
Updated:
2015-01-15

RHBA-2015:0038 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat Storage 3.0 enhancement and bug fix update #3

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated glusterfs, gluster-afr, gluster-dht, distribution, build,
gluster-nfs, gluster-quota, gluster-smb, gluster-snapshot, gluster-swift,
glusterfs-geo-replication, glusterfs-rdma, and glusterfs-server packages
that fix numerous bugs and add various enhancements are now available
for Red Hat Storage 3.0.

Description

Red Hat Storage is software-only, scale-out storage that provides flexible
and affordable unstructured data storage for an enterprise. GlusterFS, a
key building block of Red Hat Storage, is based on a stackable user-space
design and can deliver exceptional performance for diverse workloads.
GlusterFS aggregates various storage servers over network interconnections
into one large, parallel network file system.

This update fixes numerous bugs and adds various enhancements in RDMA,
SMB, Snapshot, Swift, NFS, Quota, and Geo-replication. Space precludes
documenting all of these changes in this advisory. Users are
directed to the Red Hat Storage 3 Technical Notes, linked to in
the References section, for information on the most significant
of these changes.

This advisory adds the following enhancements:

  • With this advisory, User Serviceability Snapshot is out of technology

preview and is supported. You can now view and retrieve snapshots
using CIFS for a Windows client. A new volume set option
'features.show-snapshot-directory' is added to make the '.snaps' directory
explicitly visible at the root of the share. (BZ#1094830)

  • With this advisory, Remote Direct Memory Access (RDMA) support for

communication between GlusterFS bricks and clients is out of technology
preview and is supported. It fixes bugs and provides options to configure
RDMA support for the new and existing volumes. (BZ#852276)

  • Red Hat Storage Object Store has been rebased to Red Hat OpenStack Icehouse.

This feature allows you to schedule deletion of objects which are stored
in the Red Hat Storage volume. You can use the Object expiration feature
to specify a lifetime for objects in the volume. When the lifetime of
an object expires, it automatically stops serving that object at the
specified time and shortly thereafter removes the object from the
Red Hat Storage volume. (BZ#1180463)

  • A new command, 'gstatus' provides an easy-to-use, high-level view of the

health of a trusted storage pool with a single command. It gathers
information by executing the GlusterFS commands, to gather information
about the statuses of the Red Hat Storage nodes, volumes, and bricks.
The gstatus command is under technology preview. (BZ#1171546)

All users of Red Hat Storage are advised to install these updated packages.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64
  • Red Hat Gluster Storage Nagios Server 3 for RHEL 6 x86_64

Fixes

  • BZ - 991300 - nfs: mount using symlink of a dir fails
  • BZ - 1050823 - [RHEV-RHS] Excessive warning messages in rebalance log files, while doing rebalance with self-heal
  • BZ - 1061585 - Remove-brick: File permission (setuid) changes after migration of the file
  • BZ - 1065501 - AFR: Crash on client when creating files for self heal of 50k files testcase.
  • BZ - 1101438 - nfs: ls shows "Permission denied" with root-squash
  • BZ - 1102647 - nfs: reset command does not alter the result for nfs options earlier set
  • BZ - 1104635 - [SNAPSHOT]: before the snap is marked to be deleted if the node goes down than the snaps are propagated on other nodes and glusterd hungs
  • BZ - 1107606 - Setting either of user.cifs or user.smb option to enable leads to enabling of smb shares. Enable only when none are disable
  • BZ - 1115441 - [RHS-LOGGING]: Some of the log messages are not printing the log-level in the logs
  • BZ - 1115899 - [USS]: "ls -l" on .snaps directory from nfs mount gives " Remote I/O error "
  • BZ - 1120072 - Remove legacy RHS 2.0 upgrade scripts from redhat-storage-server package for RHS 3.0
  • BZ - 1122886 - DHT :- If mkdir is in progress (completed only on hashed) and lookup from another mount point race with it, due to selfhealing mkdir will give 'I/IO error' even though Directory is creation is done
  • BZ - 1122978 - SMB:While running command user.cifs enable/disable there are error messages in log file for hook script.
  • BZ - 1123732 - Executing volume status for 2X2 dis-rep volume leads to "Failed to aggregate response from node/brick " errors in logs
  • BZ - 1127658 - SMB:On Cifs mount creating files and doing list or running arequal checksum fills client log with "found anomalies for /.. gfid" issue
  • BZ - 1130158 - BVT: Gluster rebalance status returns failure
  • BZ - 1138547 - Peer probe during rebalance causing "Peer rejected" state for an existing node in trusted cluster
  • BZ - 1139156 - dist-geo-rep: Few files are not synced to slave when files are being created during geo-rep start
  • BZ - 1140517 - DHT + rebalance :- skipped file count is always 'zero' even though rebalance has skipped many files .
  • BZ - 1142087 - Warning message to restore data from removed bricks, should not be thrown when 'remove-brick force' was used
  • BZ - 1142283 - nfs: volume set help says the rmtab file is in "/var/lib/glusterd/rmtab"
  • BZ - 1142960 - dist-geo-rep: geo-rep status in one of rebooted node remains at "Stable(paused)" after session is resumed.
  • BZ - 1144423 - DHT + rebalance :- log is full of warning 'dict is NULL'
  • BZ - 1144428 - dist-geo-rep: Session going into faulty with "Can no allocate memory" backtrace when pause, rename and resume is performed
  • BZ - 1146830 - Enabling Quota on existing data won't create pgfid xattrs
  • BZ - 1146906 - glusterfs process crashed when performing stat on a file from a snap volume mount
  • BZ - 1147427 - High memory usage by rebalance process
  • BZ - 1154617 - Fuse mounting of a tcp,rdma volume with rdma as transport type always mounts as tcp without any fail
  • BZ - 1157334 - [SNAPSHOT]: snapshot should be deactivated by default when created
  • BZ - 1158844 - [USS]: Typo error in the description for USS under "gluster volume set help"
  • BZ - 1158883 - [USS]: snapd process is not killed once the glusterd comes back
  • BZ - 1158898 - [USS]: creating file/directories under .snaps shows wrong error message
  • BZ - 1159173 - [USS] Logging is completely messed up after enabling the USS and carrying out few cases, snapd logs and nfs logs exhausted 47GB of logs in 3 hours
  • BZ - 1159705 - [USS]: All uss related logs are reported under /var/log/glusterfs, it makes sense to move it into subfolder
  • BZ - 1160138 - [USS] : Snapd crashed while trying to access the snapshots under .snaps directory
  • BZ - 1160233 - [USS] : Rebalance process tries to connect to snapd and in case when snapd crashes it might affect rebalance process
  • BZ - 1160641 - [USS]: After snapshot restore , if user is under snap directory which was restored, ls on the snap directory hangs
  • BZ - 1161531 - [USS]: Unable to access .snaps after snapshot restore after directories were deleted and recreated
  • BZ - 1162468 - cli command does not show anything when command times out
  • BZ - 1163030 - [USS]: snapd process is not getting start on the newly attached nodes in cluster
  • BZ - 1163209 - [USS]: cd to snap directory from fuse/nfs hungs OR takes too long when a node is brought offline
  • BZ - 1163703 - [USS]: If the snap name is same as snap-directory than cd to virtual snap directory fails
  • BZ - 1164721 - Packaging gstatus utility with RHS
  • BZ - 1165026 - [USS]: Non root user who has no access to a directory, from NFS mount, is able to access the files under .snaps under that directory
  • BZ - 1165097 - [USS]: data unavailability for a period of time when USS is enabled/disabled
  • BZ - 1165255 - Refresh "rhs_system_init" script in /usr/lib/glusterfs/.unsupported
  • BZ - 1165704 - [USS]:After deactivating a snapshot trying to access the remaining activated snapshots from NFS mount gives 'Invalid argument' error
  • BZ - 1165904 - object-expirer.conf could file should contain some meaningful explanation for each key in it
  • BZ - 1167613 - BVT: Setting "user.cifs" to disable is not removing the Samba share from smb.conf
  • BZ - 1168873 - [USS]: If uss is disabled and than enabled ls from virtual snap world hungs
  • BZ - 1169764 - RDMA: iozone fails with fwrite: Input/output error when write-behind translator is enabled
  • BZ - 1175088 - Files creates are very slow in directories already having files in it.
  • BZ - 1177927 - [AFR] getfattr on fuse mount gives error : Software caused connection abort
  • BZ - 1179704 - In the RHS ISO the gstatus package should be under the 'Red Hat Storage Tools' package group and not under Base/Core package group
  • BZ - 1180463 - [FEAT/RFE] Swift's object expiration feature should work in gluster-swift plugin

CVEs

  • CVE-2014-3619

References

  • https://access.redhat.com/site/documentation/en-US/Red_Hat_Storage/3/html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
glusterfs-3.6.0.42-1.el6.src.rpm SHA-256: 9132a44baf6e0573991380c84dbda9ccebeb4d9b06e3975f7873510cd051bf4a
x86_64
glusterfs-3.6.0.42-1.el6.x86_64.rpm SHA-256: a418ef370e4da70e67d2e4a694016e30024d8055a129662f785c5797c90c1d8a
glusterfs-api-3.6.0.42-1.el6.x86_64.rpm SHA-256: a1ab0047433876c00187972015c457d01f32e244443224c243f9c7561b440c44
glusterfs-api-devel-3.6.0.42-1.el6.x86_64.rpm SHA-256: ed1ac892b305ddd8621b570792e25480065227ec21d27c6ad180896e4b13e564
glusterfs-debuginfo-3.6.0.42-1.el6.x86_64.rpm SHA-256: 56dfa04e1a36a6fc43e755d39fea20dd05c2d29bcd88a7e515853b72c4c395d2
glusterfs-devel-3.6.0.42-1.el6.x86_64.rpm SHA-256: 6440a6b05e0526cc5502208da4ebbd9ee424696660ca0be22294517c3fb5c9ce
glusterfs-fuse-3.6.0.42-1.el6.x86_64.rpm SHA-256: 2ca0d50512e6f88bdeec6a451e5062a22a22636514e390cb9d718371f86a445a
glusterfs-libs-3.6.0.42-1.el6.x86_64.rpm SHA-256: 6ebfb3597cdc000fe5f8f9ef766f607711c8a899265ae5e9d62d612b49e76a78
glusterfs-rdma-3.6.0.42-1.el6.x86_64.rpm SHA-256: ab88ad81097deea89bd42637272db90b009b1abdc8dfe125a97cca10f8f68483

Red Hat Enterprise Linux Server 5

SRPM
glusterfs-3.6.0.42-1.el5.src.rpm SHA-256: 59f0d65777770efaf331fb2c8d5a77f06317a0e6e8b334cbdb5ed5ac89b9379f
x86_64
glusterfs-3.6.0.42-1.el5.x86_64.rpm SHA-256: dbc17d6866a3cc5b4a8410798a0099fb9cf164336a90afbfb0683c2bd59535b4
glusterfs-api-3.6.0.42-1.el5.x86_64.rpm SHA-256: 6fae5b3f773606acf44b82baf8b2f1b3ddb2359759bab48b71d53700ee3d77e1
glusterfs-api-devel-3.6.0.42-1.el5.x86_64.rpm SHA-256: 4617e31256ee3e3feeabf552fb5ed510e2fcfe1f75fcc5555d7209404dfdb521
glusterfs-debuginfo-3.6.0.42-1.el5.x86_64.rpm SHA-256: 96da61afe501e0d5782b5f88004307695aefafe5e08f1c0500aad956a5a8c21b
glusterfs-devel-3.6.0.42-1.el5.x86_64.rpm SHA-256: 03c97d59fc8920349343e58fe38b0783bae93011cc3d836d2f89ca5035dbfc4d
glusterfs-fuse-3.6.0.42-1.el5.x86_64.rpm SHA-256: 3d9166740f702bb87e0dc35f56826ce0ccbfdd9a7d2d8a0cc17a77590bf6b10c
glusterfs-libs-3.6.0.42-1.el5.x86_64.rpm SHA-256: 7831f5290469cb1f11cb3ea778358af3828ee97c54473399890c0edc09115052
glusterfs-rdma-3.6.0.42-1.el5.x86_64.rpm SHA-256: 8292463d3f802f6988bf5ce53e0967d942adcd1042a4881661f0a83ba6396d91

Red Hat Gluster Storage Server for On-premise 3 for RHEL 6

SRPM
gluster-nagios-addons-0.1.14-1.el6rhs.src.rpm SHA-256: 15ab1bd33e60eeab65aa795324a92cb7372e05cc0eb2818d13d7d5abd49a147a
gluster-nagios-common-0.1.4-1.el6rhs.src.rpm SHA-256: 95d868f074dbdb3988019635287ea84eb67abaed671cf9a6e4738a1aa0a9541f
glusterfs-3.6.0.42-1.el6rhs.src.rpm SHA-256: 58fb4521d73c9163ae2f557647f9a610dc7bcc659726f3eaf867cfec53edcc54
gstatus-0.62-1.el6rhs.src.rpm SHA-256: a184787f8607e9505d0c9ed7998278d93e857437bb5a3cd0fd15e86c81c178c1
openstack-swift-1.13.1-2.el6ost.src.rpm SHA-256: e561f0dc0998a659265e4bb2c65f0c74c8002ff9fe00788a8b7e3da978fcba59
openstack-swift-plugin-swift3-1.7-3.el6ost.src.rpm SHA-256: a6f9818ca39ab578d5aae22f4c002f3b603b7c711d25a72e58fa07f10cb72778
python-paste-deploy-1.5.0-10.el6ost.src.rpm SHA-256: 12040edcf6a50f0cd001260034b011411dafab5f7c56287af4bdafb94340ffe2
python-swiftclient-2.1.0-2.el6ost.src.rpm SHA-256: ef6b6226265b56fad441247882bc0bc932b6fe8af55a09f51536c8b427a1f670
redhat-storage-server-3.0.3.4-1.el6rhs.src.rpm SHA-256: 60e06020a02b02e01c5ef6575cf8706f5f14b2473b90cc4b47f2c94123f02951
samba-3.6.509-169.4.el6rhs.src.rpm SHA-256: f1cb87373c9e5fdf0f725eecfd2fbc368dbb89d1b9775608db5187ce8601d9f0
swiftonfile-1.13.1-2.el6rhs.src.rpm SHA-256: 32b78e0e859fd60d8e896949b7dc7a05cbc05410ccd97e15978c9e69f2ef1ef5
vdsm-4.14.7.3-1.el6rhs.src.rpm SHA-256: bf289440c5a375ade49bae851422f1479f0d4571e5b170309fc03bd45e0b59af
x86_64
gluster-nagios-addons-0.1.14-1.el6rhs.x86_64.rpm SHA-256: f878abcb0349357065ba7e74b7c1bfcb4034af4a2550188c89875e1d8b6019ca
gluster-nagios-addons-debuginfo-0.1.14-1.el6rhs.x86_64.rpm SHA-256: 3020608be418f81954d6b4d70cfc038cfccca3597a1dbcdd924dfceb308158fb
gluster-nagios-common-0.1.4-1.el6rhs.noarch.rpm SHA-256: 295e8697cdc1f48c07c9546987c90035749b64655faad9ac0c28351b27cf20ae
glusterfs-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: 5afdfa480f80041db27c2e658b1b09d6d3604f3176c0900cdaa79526de339bc0
glusterfs-api-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: 42f226920e7306cb4f4b353850d7be6410fd30b52ba1b45dfa15770e9363da7b
glusterfs-api-devel-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: b663b0a37a1f8f9fd3a772ad35b195193800b40503481a84301678474618e6cb
glusterfs-cli-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: 4f837441002fd90de990a11b01ec6cae3f58e65bd123c4f6477a1583ff2b237f
glusterfs-debuginfo-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: b25a572a2c09b943cc4c15e330e42d4871f12a46ea965e7b7d0b34fe969030cb
glusterfs-devel-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: b0f98168fbbe964fede35f34cdaee66f9404efc59b3a1a54e4e52ca85db28239
glusterfs-fuse-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: 7ad4841242bfa5d0b9da73d9dbf3aff78a349e259f7f077ebf71ddea5b2bc941
glusterfs-geo-replication-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: 0f36f478c03e76d6dd79efceb3aa0c91bab7a818c6e76663c90e723b59e2fa85
glusterfs-libs-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: f67db5c476fcd1e076e7fc6824d2b5005442f60328cdcde34b1e732611385a12
glusterfs-rdma-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: a9996dd12312fd644ee5ac074f7c49b4bc4cbeab4399f0053def04ce86408738
glusterfs-server-3.6.0.42-1.el6rhs.x86_64.rpm SHA-256: 0ee14f8b71b7a618ccfc08a0a251684efbf001f696345490d1ded726e5d0b5bf
gstatus-0.62-1.el6rhs.x86_64.rpm SHA-256: 01f6a03b756652d5e34bd7a62a7990d1eb5db0431b8e01ae9f1b42556f7f2953
gstatus-debuginfo-0.62-1.el6rhs.x86_64.rpm SHA-256: eaf0fd0813506a678876a9a5c7ccccb8d10c1195c7e9af4858c82b59848a339b
libsmbclient-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 5a71bf257b10a2d2fb87ae2db83a888020be9dfa0b48bf0813742581db84488d
libsmbclient-devel-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 1fbea04cf0b980e8df1cd1f25eb6ccac56a514ca86612fac319bc9807d730428
openstack-swift-1.13.1-2.el6ost.noarch.rpm SHA-256: ff2f2a4d795ed4b72a768cc5dfeaec3b0727a207fd74f93e5bb5bc5d71f5a613
openstack-swift-account-1.13.1-2.el6ost.noarch.rpm SHA-256: 61868c299650827f4984af3962035c866b783549733da9ac5f113b37e7f8237b
openstack-swift-container-1.13.1-2.el6ost.noarch.rpm SHA-256: d969252504284d69dde079fe01eadd25116ce909750cc402c68c3b08179e93bc
openstack-swift-doc-1.13.1-2.el6ost.noarch.rpm SHA-256: 58ed015867efb56905b4137e226c89da27975c21875256b96e55313b463f6d89
openstack-swift-object-1.13.1-2.el6ost.noarch.rpm SHA-256: 11a249f0b835ec5e5d416cea6291ecd72a14d7428deabad3a7ccfcff1896df09
openstack-swift-plugin-swift3-1.7-3.el6ost.noarch.rpm SHA-256: 3076a66c028f02b9fc0b4dc130eb5bf8c606dcfb600e1a6c42f685c6e2a61b4c
openstack-swift-proxy-1.13.1-2.el6ost.noarch.rpm SHA-256: e92b75d618273a970f69851342d7aabe31c141d976f77ea274825d0847d40524
python-paste-deploy-1.5.0-10.el6ost.noarch.rpm SHA-256: 018db022115f9329ab7dfe7f274aa78529cb7cdca8db9f459ba42a96346ad1cd
python-swiftclient-2.1.0-2.el6ost.noarch.rpm SHA-256: 317c4c4cedfde8ae791b7ee0cf6d389883c12d3dd308c3b4a8c8bcb5537628a0
python-swiftclient-doc-2.1.0-2.el6ost.noarch.rpm SHA-256: d66ec95ba4d11b6c28e12282cb55dd1a9e368e8ea1593785ef7d4379a830c620
redhat-storage-server-3.0.3.4-1.el6rhs.noarch.rpm SHA-256: b3874dd7078091e48834d37ffbd28a4bdd28d1954366581ffb19aec562f543d3
samba-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 8c6fb52b611a442d54c0202264bb1f780bf3aaa97213576cef2257c15f6d3378
samba-client-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 1350ef4e7daabee36918e440ba8649c6d3cabb0f1630c5e8ae0e1c8ac7089d9b
samba-common-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: f040a8c4e77aa877ba338370546db318099494197468c288d599a7421e22605d
samba-debuginfo-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 2eea037085bfb97b0ad253ed0001372f93e293d63ca3a3a9ca98c72aa71afe72
samba-doc-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 02e92b4ab5f60beb432f6bf4bb590342fa7962e8ac3613c1ae2e71e0c8b16a8c
samba-domainjoin-gui-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: aace344cd172166485a144139217f3e185f190cba367dfac308043761829ca09
samba-glusterfs-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 45cea4825702aff0ce44dcda9af360b446402eebff47d6102d7c3f757c7ffd81
samba-swat-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 4ed11f7e3ada211098ef38dad44e71f4af3ad57594755f75ebb81d8910042e7d
samba-winbind-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: a56eacc12bfe6a27ab3b7c44775ff014b9c738d2fc329d5529ce14db242cf614
samba-winbind-clients-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 67f750208b046de3624b3167cafa98b0ec9c9ee4ffba83e0589b1094eaf3f8b4
samba-winbind-devel-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 27971c40a10ddda5b92d8f31f89cbf2de3b378477906b0ebc7187bf32195e262
samba-winbind-krb5-locator-3.6.509-169.4.el6rhs.x86_64.rpm SHA-256: 5817bfbda8b84ed69fc6654578aebb94dc658bb931754a81a7ecafadbccb3668
swiftonfile-1.13.1-2.el6rhs.noarch.rpm SHA-256: f757610062a8bd044362916669f62568b1970fe11f7982b23ea690a3b737f4a2
vdsm-4.14.7.3-1.el6rhs.x86_64.rpm SHA-256: 4e4286259d529aca3a5437c99410dc3cf28d7fa50e3ff00b78965a32cd3ccd35
vdsm-api-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 6b9b4386a8b463c7d8b2287d54813385a496b9c43d53d6728937d86f635aef68
vdsm-cli-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 015a7976fc1294fd2adc8792b5b70bf97d142068f68aac421674459f98ef40b1
vdsm-debug-plugin-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 8deb2ba072dcfb458b8a9a0cf1cd6c53d4266ee58d369dcae13de0e5b6d71e0c
vdsm-debuginfo-4.14.7.3-1.el6rhs.x86_64.rpm SHA-256: 21ac9381f928105ffaf372f19b7579366065939810ee3a586817cd88bc8c440b
vdsm-gluster-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: f2bab628b17fc2785c7f7ea4f00d9e370e332578196faaffe3202696b8174cc1
vdsm-hook-faqemu-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 058131aaebcd5579077e0446fdd9eea3e1df9ce60df3afeda0447cf1de31806e
vdsm-hook-openstacknet-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 4eb9aacdf1072277d9f3989c60ae3e569131c9d0abbef37cf9ed08478f29e3b3
vdsm-hook-qemucmdline-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: ee180d18d85f849ef8f958d21de6bd8f5d1df5e83819f53188241d7b09827b08
vdsm-jsonrpc-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 6d89db2145a3761696ee6468fc199e7ed07f3952f70af2ffb5d5707934a51063
vdsm-python-4.14.7.3-1.el6rhs.x86_64.rpm SHA-256: 4073a35daada35daa8321c22f909cc81c8320c0f6690208cf8cd358c2b55a68b
vdsm-python-zombiereaper-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 50b4ee9ab188c8e3fac3b9bfd22142d829caa7edd62c57373f1e7e79eec73740
vdsm-reg-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: b35560231b57c1cb240955a6178d1255d0233f42689ef603b6cf866f732b01b7
vdsm-tests-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: b32887a3c86ec5a143d96eb2d687a403b6282cfdc82262e95e2a7f7acb7bdef1
vdsm-xmlrpc-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: 60cc44fa6012b4b8701b43506ac79bce5de784ea82cc349c963e721c0ff6967f
vdsm-yajsonrpc-4.14.7.3-1.el6rhs.noarch.rpm SHA-256: dc777a158b382ff5b593a9f05ac94785d08a8e7eddb4926c6b44e5a2f382c907

Red Hat Gluster Storage Nagios Server 3 for RHEL 6

SRPM
gluster-nagios-common-0.1.4-1.el6rhs.src.rpm SHA-256: 95d868f074dbdb3988019635287ea84eb67abaed671cf9a6e4738a1aa0a9541f
x86_64
gluster-nagios-common-0.1.4-1.el6rhs.noarch.rpm SHA-256: 295e8697cdc1f48c07c9546987c90035749b64655faad9ac0c28351b27cf20ae

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility