Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2018:0083 - Bug Fix Advisory
Issued:
2018-01-11
Updated:
2018-01-11

RHBA-2018:0083 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

glusterfs bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated glusterfs packages that fix several bugs are now available for Red Hat Gluster Storage 3.3 Update 1 on Red Hat Enterprise Linux 7.

Description

Red Hat Gluster Storage is a software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.

This advisory addresses critical bugs related to memory leaks and fixes
the following bugs:

  • Executing gluster volume set operations on volumes from gluster CLI

caused a significant memory leak in glusterd process. The memory leak
issues have been fixed in this release. (BZ#1526363)

  • Previously, while executing a series of gluster commands like volume

create/start/stop/delete, glusterd process' memory footprint increased.
In a scalable environment where multiple volumes are created, deleted,
and recreated led to high glusterd memory consumption. With this update,
the identified memory leaks in glusterd are fixed. (BZ#1526365, BZ#1526374)

  • Executing multiple volume commands concurrently on the same volume,

from different peers of the trusted storage pool, results in one of
the glusterd processes from the same pool moving to the locked state.
Any volume management operations performed on the same volume fail until
the glusterd service is restarted on the node where glusterd is in
transaction locked state. This release introduces a default transaction
lock timeout of 3 minutes. Any glusterd process reaching the locked state
will remain there for 3 minutes. Any transactions made now execute
successfully after this timeout period. (BZ#1526372)

  • The portmap entry allocation that glusterd maintains for each of its

brick is cleaned up on a graceful shutdown of the respective brick
processes. When a brick process was killed through SIGKILL signal or
crashed, glusterd did not clean up the respective portmap entry allocation
which could result in two portmap allocations for the same brick when the
brick process was restarted. glusterd reports with a stale port to the
client, resulting failure in connection. With this fix, the stale port
entry is removed even for a brick crash or SIGKILL event of a brick
process. The client now successfully connects to the brick after the brick
is restarted. (BZ#1526371)

  • When processes that use a large number of POSIX locks, like Samba,

were used in combination with the gluster clear-locks command, a memory
leak created high memory consumption on brick processes. This sometimes
triggered OOM killer on brick processes. The lock translator has been
updated to correct this issue and fix the memory leak. (BZ#1526377)

Users of glusterfs are advised to upgrade to these updated packages, which fix these bugs.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64

Fixes

  • BZ - 1526363 - [RHEL 7] high memory usage by glusterd on executing gluster volume set operations
  • BZ - 1526368 - Brick Multiplexing: stale brick processes getting created and volume status shows brick as down(pkill glusterfsd glusterfs ,glusterd restart)
  • BZ - 1526371 - clean up port map on brick disconnect
  • BZ - 1526372 - Unable to acquire lock for gluster volume leading to 'another transaction in progress' error
  • BZ - 1526373 - Brick Multiplexing: Gluster volume start force complains with command "Error : Request timed out" when there are multiple volumes
  • BZ - 1527147 - [GSS] [Regression] glusterfs threads consuming swap space until it runs out
  • BZ - 1527772 - remove ExclusiveArch directive from SPEC file
  • BZ - 1530217 - Brick multiplexing: glustershd fails to start on a volume force start after a brick is down
  • BZ - 1530320 - Brick Multiplexing: brick still down in heal info context(glfs) even though brick is online

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
glusterfs-3.8.4-54.el7.src.rpm SHA-256: 6f9f468a6a62bf2cc861bc639aa69c5281661e2d8e13417e1a85c4e8adab4d82
x86_64
glusterfs-3.8.4-54.el7.x86_64.rpm SHA-256: 6ebcd51f44552ae1c1af813099ea64111bf5bbb7a7725e65239ac44a4ed93573
glusterfs-api-3.8.4-54.el7.x86_64.rpm SHA-256: a9a9d384057d36a68300a429d5e5d48d05a08560de2fbcf5b3cd56dffa83b48b
glusterfs-api-devel-3.8.4-54.el7.x86_64.rpm SHA-256: 386787011723c550bae583bf298adb5219cea5386c43d853fe3ec2d9f312ba65
glusterfs-cli-3.8.4-54.el7.x86_64.rpm SHA-256: bff5282c11275d4336e087c21ac331b35d7011a7bf5774a234302321216166e3
glusterfs-client-xlators-3.8.4-54.el7.x86_64.rpm SHA-256: 45bb39d1b34e1e30cb9f3077f25a840a57597b1f5103051095703a26476b5705
glusterfs-debuginfo-3.8.4-54.el7.x86_64.rpm SHA-256: 487399c8b99df24dadedc5ac61dafdb61755acd91e7ffdeadd7c4b79fbbde141
glusterfs-devel-3.8.4-54.el7.x86_64.rpm SHA-256: 7c21fb03a85f0cf67118880ccd7cb1e99e4a24b1d12414103840f56b0b7c3bab
glusterfs-fuse-3.8.4-54.el7.x86_64.rpm SHA-256: de4bd178050dbdfd752ad0aea253ba27a7430fc1ba66f8551ebce63033dda9e9
glusterfs-libs-3.8.4-54.el7.x86_64.rpm SHA-256: 7b94b7f12791a748069be76e4922393d161cafd3c1c1957de900cfccfd8eb1db
glusterfs-rdma-3.8.4-54.el7.x86_64.rpm SHA-256: bd1ecb45770be6013e3b22c5fda7c80d48af88ca2e4a62d9847afeda9ba1dda8
python-gluster-3.8.4-54.el7.noarch.rpm SHA-256: 8545e9e324a4130b70238d9f324aa36346b5985811f6812b43b600285b24eb53

Red Hat Virtualization 4 for RHEL 7

SRPM
glusterfs-3.8.4-54.el7.src.rpm SHA-256: 6f9f468a6a62bf2cc861bc639aa69c5281661e2d8e13417e1a85c4e8adab4d82
x86_64
glusterfs-3.8.4-54.el7.x86_64.rpm SHA-256: 6ebcd51f44552ae1c1af813099ea64111bf5bbb7a7725e65239ac44a4ed93573
glusterfs-api-3.8.4-54.el7.x86_64.rpm SHA-256: a9a9d384057d36a68300a429d5e5d48d05a08560de2fbcf5b3cd56dffa83b48b
glusterfs-api-devel-3.8.4-54.el7.x86_64.rpm SHA-256: 386787011723c550bae583bf298adb5219cea5386c43d853fe3ec2d9f312ba65
glusterfs-cli-3.8.4-54.el7.x86_64.rpm SHA-256: bff5282c11275d4336e087c21ac331b35d7011a7bf5774a234302321216166e3
glusterfs-client-xlators-3.8.4-54.el7.x86_64.rpm SHA-256: 45bb39d1b34e1e30cb9f3077f25a840a57597b1f5103051095703a26476b5705
glusterfs-debuginfo-3.8.4-54.el7.x86_64.rpm SHA-256: 487399c8b99df24dadedc5ac61dafdb61755acd91e7ffdeadd7c4b79fbbde141
glusterfs-devel-3.8.4-54.el7.x86_64.rpm SHA-256: 7c21fb03a85f0cf67118880ccd7cb1e99e4a24b1d12414103840f56b0b7c3bab
glusterfs-fuse-3.8.4-54.el7.x86_64.rpm SHA-256: de4bd178050dbdfd752ad0aea253ba27a7430fc1ba66f8551ebce63033dda9e9
glusterfs-libs-3.8.4-54.el7.x86_64.rpm SHA-256: 7b94b7f12791a748069be76e4922393d161cafd3c1c1957de900cfccfd8eb1db
glusterfs-rdma-3.8.4-54.el7.x86_64.rpm SHA-256: bd1ecb45770be6013e3b22c5fda7c80d48af88ca2e4a62d9847afeda9ba1dda8
python-gluster-3.8.4-54.el7.noarch.rpm SHA-256: 8545e9e324a4130b70238d9f324aa36346b5985811f6812b43b600285b24eb53

Red Hat Gluster Storage Server for On-premise 3 for RHEL 7

SRPM
glusterfs-3.8.4-54.el7rhgs.src.rpm SHA-256: a7e1e508014c41bc7c475c7106ae65c22a189b2ae86fc3362ce19d735ac929eb
x86_64
glusterfs-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: bea4bb2c1a4cd2b6083891bf153a8a3588e1be035f169dbc4f234c9a2fb75c00
glusterfs-api-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 4940eb2582008afb26750e05f7623bf5b128cf759cdcec35ee7d4f66f2ecd5f4
glusterfs-api-devel-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 99f506fd73ebcc46c0121101aa28a6a9a4d2bfa4a02c6db54785203e8b3838ba
glusterfs-cli-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 355bb45f8f7bc3f5fa06303cd520693e90c16c30e43d7f7ac4ce95a6da3405c7
glusterfs-client-xlators-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 9765a96aa0aecee10c48e07dc3c24728d69aca503cb9aac159ce59bf2fd2ca07
glusterfs-debuginfo-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: a919cf4487ce093578e8c499a401b75596823909cfa040c76bb391a59ef5e012
glusterfs-devel-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 4858992ae1e983a6c043f4268516c50674fc20806d06caada1569c1348f4bd36
glusterfs-events-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 10886e82007098df5ac220619bd316ea97dd71d49c664a844993389ba49f4453
glusterfs-fuse-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 35b822dda28b01e7291546c7a4a67920a2ef9fe65f1ac0ea97aa6ff4ba3c22c2
glusterfs-ganesha-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: c33869ba2740cd055ce259b19d2a00937ba8a7bb0507daebf5b4338c83a8404d
glusterfs-geo-replication-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: 7d875c2be43d5ec1382736ae98b6b2addd9758204e98b73d35d68f4e9612fbf9
glusterfs-libs-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: b5491740da9161a8790faaae88d5d55590ef37272acc0ce219122de11579de64
glusterfs-rdma-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: d7c535185d8547700989b5d538a6cfb2ce95e8f89a8e52eb247766a2b185be18
glusterfs-resource-agents-3.8.4-54.el7rhgs.noarch.rpm SHA-256: a7ce8edcfd3a79e215ce00657244c02ad1bf56dad249c092900445314f00c1ec
glusterfs-server-3.8.4-54.el7rhgs.x86_64.rpm SHA-256: f1e58ffab1f931ad575e0a00fbcf73561392a0f24ac661b22136c82f96bd3e60
python-gluster-3.8.4-54.el7rhgs.noarch.rpm SHA-256: 42f2b38a317752d824e8258bda78c78b873ade53620c9a7952ad562ca60b6ff8

Red Hat Virtualization Host 4 for RHEL 7

SRPM
x86_64
glusterfs-debuginfo-3.8.4-54.el7.x86_64.rpm SHA-256: 487399c8b99df24dadedc5ac61dafdb61755acd91e7ffdeadd7c4b79fbbde141

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility