- Issued:
- 2019-02-04
- Updated:
- 2019-02-04
RHBA-2019:0261 - Bug Fix Advisory
Synopsis
samba bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated samba packages that provide several bug fixes and an enhancement are now available for Red Hat Gluster Storage 3.4 Update 3 for Red Hat Enterprise Linux 7.
Description
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and various information.
This update fixes the following bugs:
- Systemd automatically sorts through the unit files to read dependencies and ordering information. Previously, Clustered Trivial Database (CTDB) did not provide correct dependency information. As a consequence, CTDB service tries to come up without mounting the lock volume from file systems table. Due to the failure in synchronizing with the other nodes in the cluster, the node enters an unhealthy state. With this fix, a dependency is added on remote network file systems target within CTDB systemd service file. Hence, the lock volume is mounted and available for CTDB to access lock file during its startup. (BZ#1177603)
- Previously, when gluster was accessed using SMB from a macOS client using the recommended vfs_glusterfs module, file handles were closed incorrectly. As a consequence, the samba service on the server would hang and the user would need to reconnect. With this fix, Samba closes the file handles at the right layer when using the vfs_glusterfs module. (BZ#1636246)
- Previously, new files created from a macOS client on an SMB share running on gluster would disappear after being created. These new files did not appear properly on the SMB file share. With this fix, samba no longer truncates the files when they are newly created through a macOS client. Hence, Samba and Gluster can be used from a macOS client. (BZ#1644284)
Users of Samba with Red Hat Gluster Storage are advised to upgrade to this updated package
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1177603 - CTDB: On a 1X2 ctdb setup,after reboot even when the /gluster/lock is not mounted the ctdb status shows ok.
- BZ - 1644284 - Edited file disappears in a SMB share on Mac OS X clients
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
samba-4.8.5-104.el7rhgs.src.rpm | SHA-256: 7554949282b5c9568d99fa10bda90cc69903c491750a71ed6b80ea29f3dfd38b |
x86_64 | |
ctdb-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 838bcedf4a7da943d817ba609c53c299ac5ef52cd8af8ab8406e2ce40b603793 |
libsmbclient-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 9337941a62b27a178be762235bed5d46dd4904db0855f14e4c8512e46645adac |
libsmbclient-devel-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: c0f4e266337236cc60368902e8b6cd6da0ac46fd500b98be7c75120e22de7516 |
libwbclient-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: d1452659830c279025ca443592b63400f0779f9d78a0b7fadc2b58abb41262f2 |
libwbclient-devel-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: ecb4ab685cc87fdb7a68f999ff9270f8890897c908cf3d0d8c948d208fe07988 |
samba-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: e6520a8c8fa6bf793f3c02a986845f718dc48f78aa354eeac729847de68ae14d |
samba-client-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: d23dec00bac2f331580f756dacb90b9bfc3f140afac6c26a2906e3a81b2ab7a5 |
samba-client-libs-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 2381e67cdcab58b8ea0385b199e8f9d0f39588592c6f2dbb1495715d02617349 |
samba-common-4.8.5-104.el7rhgs.noarch.rpm | SHA-256: 89b8f22012813d356065716444a4a8b1af39c6fde79ab436af08ba139509b90a |
samba-common-libs-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 30307268fca755965db3f0de14c8f01a4cc30a48f1f51d98951865e0e89bdd21 |
samba-common-tools-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 7c90ffa182b3d63c457993e82088bd30c1b74590afaf6a9c300ecc9a18839fc2 |
samba-dc-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 8a43e7b5e306190e0ba69a9b0a64c604e9b5ec52c6d9337c44d499faf7ec4309 |
samba-dc-libs-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 61762e94499c3be4e666439e2768fa32b7a7ea8a41970682b26b00c73364eea9 |
samba-debuginfo-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 6b154b89f1b9effd8f09d9e5d159cdee17913020498f9fecedd35247e3b12e63 |
samba-devel-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 351642b10910c955b71a9c31c91990b1491503af144f3e45dfa1af05f3bc2901 |
samba-krb5-printing-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 95ba98eb4296b19fca93e856c16718a0228614f71faacd2b16a3718f9ce61224 |
samba-libs-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 3f27a63c5a23ff839d66524e6fd5f82575d160d7c9d734a96cecd1d02110663f |
samba-pidl-4.8.5-104.el7rhgs.noarch.rpm | SHA-256: 67ea39e7b19d21eb5a356fffa946a9dee7c961192e1fb013ac6589c103651ba4 |
samba-python-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: d8dc25aff1573f789af3b379d0150a549c9733246cafa404ad7dd1e55154da3a |
samba-vfs-glusterfs-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 06e3599712c9047e7c4c8b1ec882572d8d17058eb1b0cdf95e6c700077e4b52e |
samba-winbind-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 9f32a595d3a52140c921cb3b4fc7ec6dd5d0e7c495b058776d5c0b94587dbed9 |
samba-winbind-clients-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 873a51581f7ebe2ee4192f278d297618fd1579d4ee921a7912fb6d4b7b8354a3 |
samba-winbind-krb5-locator-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: 9fd696104da2fbd1f3b30ac4995ad8969d0f613076f42952cdbe5758f7b68e6b |
samba-winbind-modules-4.8.5-104.el7rhgs.x86_64.rpm | SHA-256: ea13f6a3dd6b0a492bd673a977ac152cbfb82789b7ef81ed5b61b1d44c9e8fb9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.