- Issued:
- 2018-11-06
- Updated:
- 2018-11-06
RHBA-2018:3509 - Bug Fix Advisory
Synopsis
vdo bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdo packages that fix several bugs are now available for Red Hat Enterprise Linux 7.
Description
The vdo packages provide the kernel module for Virtual Data Optimizer
(VDO), which is a block virtualization technology that enables you to create
compressed and deduplicated pools of block storage.
This update fixes the following bugs:
- New parameters introduced to VDO volume configuration files in RHEL 7.6 previously broke compatibility with Red Hat Enterprise Linux 7.5. Consequently, the vdo utility failed to read the configuration file, and the VDO volume was not started. With this update, the problem has been fixed, and vdo is now able to start the old VDO volume as expected.(BZ#1619603)
- When the write policy of a VDO device was set to "sync", or if the underlying storage device did not accept flushes, the VDO recovery journal thread overflowed its available stack space during a reaping operation. Consequently, the stack frames were corrupted, and some errors such as NULL pointer dereferences occurred. With this update, the recovery journal reaping code has been restructured to strictly limit thread stack size. As a result, the stack can no longer overflow, and the thread state corruption no longer occurs under the described circumstances. (BZ#1619605)
- If a block map page of a physical volume on a VDO device was bigger than 16 TB, a 64 bit block number was truncated into 32 bits. Consequently, both normal recovery and read-only rebuild became unresponsive. With this update, the underlying source code has been fixed, and physical volumes bigger than 16 TB no longer hang during recovery or read-only rebuild. (BZ#1630192)
Users of vdo are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64
- Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64
Fixes
- BZ - 1619603 - Introducing new parameters to the vdo config file breaks compatability with RHEL7.5 [rhel-7.5.z]
- BZ - 1619605 - NULL pointer dereference while deleting VDO volumes that had been used for stacked raid testing [rhel-7.5.z]
- BZ - 1630192 - Possible infinite hang during rebuild if physical volume greater than 16T. [rhel-7.5.z]
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5
| SRPM | |
|---|---|
| kmod-kvdo-6.1.0.187-17.el7_5.src.rpm | SHA-256: df6342e7b0dcd47f1ce69cf918f4f90d72fe130f96c88afcdc789e8cbcc7c5b9 |
| vdo-6.1.0.185-18.src.rpm | SHA-256: a33e1ed53fff10965027da929d8cfd7893bf60057146a6296cb963ea2988724e |
| x86_64 | |
| kmod-kvdo-6.1.0.187-17.el7_5.x86_64.rpm | SHA-256: cd67e468410393fcfa3e2467397a9bdfee728f6f7890cdd95cb81bda2b626971 |
| kmod-kvdo-debuginfo-6.1.0.187-17.el7_5.x86_64.rpm | SHA-256: 3e7cad1136397261179043131a11702a1d166c217be0173427c0c440efc34401 |
| vdo-6.1.0.185-18.x86_64.rpm | SHA-256: 0f8a7d8e5e2a75b0dd9c4d7d5d245a3094917ad35d6c82db87a3e0e213a7bc40 |
| vdo-debuginfo-6.1.0.185-18.x86_64.rpm | SHA-256: 951fdfe4e7bb426c275dfdbb66e1437775f45c6619f1ee220927c4007bbce334 |
Red Hat Enterprise Linux EUS Compute Node 7.5
| SRPM | |
|---|---|
| kmod-kvdo-6.1.0.187-17.el7_5.src.rpm | SHA-256: df6342e7b0dcd47f1ce69cf918f4f90d72fe130f96c88afcdc789e8cbcc7c5b9 |
| vdo-6.1.0.185-18.src.rpm | SHA-256: a33e1ed53fff10965027da929d8cfd7893bf60057146a6296cb963ea2988724e |
| x86_64 | |
| kmod-kvdo-6.1.0.187-17.el7_5.x86_64.rpm | SHA-256: cd67e468410393fcfa3e2467397a9bdfee728f6f7890cdd95cb81bda2b626971 |
| kmod-kvdo-debuginfo-6.1.0.187-17.el7_5.x86_64.rpm | SHA-256: 3e7cad1136397261179043131a11702a1d166c217be0173427c0c440efc34401 |
| vdo-6.1.0.185-18.x86_64.rpm | SHA-256: 0f8a7d8e5e2a75b0dd9c4d7d5d245a3094917ad35d6c82db87a3e0e213a7bc40 |
| vdo-debuginfo-6.1.0.185-18.x86_64.rpm | SHA-256: 951fdfe4e7bb426c275dfdbb66e1437775f45c6619f1ee220927c4007bbce334 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.