- Issued:
- 2019-03-27
- Updated:
- 2019-03-27
RHBA-2019:0659 - Bug Fix Advisory
Synopsis
glusterfs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated glusterfs packages that fix several bugs are now available for Red
Hat Gluster Storage 3.4 Batch 4 Update on Red Hat Enterprise Linux 6.
Description
Red Hat Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
This advisory fixes the following bugs:
- A race condition between directory healing and remove empty directory
operation left directories behind on some bricks. Now the race condition is
fixed and clients should be able to view the directories after the
commands are performed. (BZ#1458215)
- This release introduces a garbage collection logic in glusterfs client
processes. This feature reduces the overall memory usage of glusterfs
client and makes sure to keep the memory consumption of glusterfs inside a
limit. (BZ#1511779)
- Earlier, a fresh lookup on a directory with the GFID on missing on some
bricks resulted in a different GFID being set on those bricks. This
variation in the GFID across the bricks caused issues with accessing the
contents of the directory. This update fixes the issue by setting the same GFID as that present on the other bricks. (BZ#1661258)
- With this update, users can configure cluster with either IPv4 or IPv6 networking. IPv6 support is available only for Red Hat Hyperconverged Infrastructure for Virtualization environments and not for Red Hat Gluster storage standalone environments. Nodes can communicate with either IPv4 or IPv6 at any given time, however, IPv6 support is for IPv6 only environments. For environments with both IPv4 and IPv6, IPv4 must be used. (BZ#1618669)
Users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64
Fixes
- BZ - 1673252 - [RHEL6] RHGS 3.4 Batch Update #4
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
glusterfs-3.12.2-47.el6.src.rpm | SHA-256: f595af9d977be05457d37510bb08e6223e2423123eccf5ccd68cb7810e6a97c4 |
x86_64 | |
glusterfs-3.12.2-47.el6.x86_64.rpm | SHA-256: d334a53bdfb5545c8a3b1d157ec04ecc453e6796a599c6d730411ae9127fa01b |
glusterfs-api-3.12.2-47.el6.x86_64.rpm | SHA-256: 71b7ec0d5d57f2dcd68168d80cf0edfb6e61531c95a2f26949cccaaad74085fd |
glusterfs-api-devel-3.12.2-47.el6.x86_64.rpm | SHA-256: 3a28f32530bc13370f784cd1004c057812585b360d13c70730a8749145dbcc9d |
glusterfs-cli-3.12.2-47.el6.x86_64.rpm | SHA-256: 322569300918b55fc54749447ebf593bf1858247271ab3d6892d52d46793412b |
glusterfs-client-xlators-3.12.2-47.el6.x86_64.rpm | SHA-256: 3f191388f2f7ba962408075c66bb4ea6d50572c3b9ad54ee5cb24c43515dfb7a |
glusterfs-debuginfo-3.12.2-47.el6.x86_64.rpm | SHA-256: c85e1ae27ee166a51c45e8ca0138ec75fb762856abdb141ca3c100ae0b182e18 |
glusterfs-devel-3.12.2-47.el6.x86_64.rpm | SHA-256: 7af1363339a79b118fb75499de5f3a064601e56320ba18011a888553adb8a534 |
glusterfs-fuse-3.12.2-47.el6.x86_64.rpm | SHA-256: d993a1f8dbc7972505301680c43be0eccca065bffa1beb21fb2466012cfb7f6c |
glusterfs-libs-3.12.2-47.el6.x86_64.rpm | SHA-256: e00b482716902862a6e9652a8412414ea3155905ec984b20c520a20ff133807d |
glusterfs-rdma-3.12.2-47.el6.x86_64.rpm | SHA-256: 9dc6ee8710c632626f47f1b94b9313495a6f82bcc35e65b2fbe5d842620cacd0 |
python2-gluster-3.12.2-47.el6.x86_64.rpm | SHA-256: f1fa44d1b2e2031336d62f4a44424bd1148a5eff2d69986e1804e9a141a21298 |
Red Hat Gluster Storage Server for On-premise 3 for RHEL 6
SRPM | |
---|---|
glusterfs-3.12.2-47.el6rhs.src.rpm | SHA-256: 9d780fc25f40665c9e15099fc0f22b2dd3fc36e0b5ed2863acfd6a65e4ffae26 |
x86_64 | |
glusterfs-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: bf97a73728e0db7aba2e7d9110964431117f3e5b175e04b84cf60ac8118ac21f |
glusterfs-api-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: f0758af5600ce04dedb02c7328bc7c37e3e3e1c44799f4f405f905cf290b9f4a |
glusterfs-api-devel-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: 98a1377176e1c76dd58e0993769d61fa2d71af22380bf9c8c5c58677e40cb6d4 |
glusterfs-cli-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: b826037f59ef43f184363b984f86e4724f02152ee2b3bed4ab88114b2345d807 |
glusterfs-client-xlators-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: 22e65c216f86f668485288b2fd64356d1d07fc0fd36bde6b56d0961fa3f58704 |
glusterfs-debuginfo-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: be3fa7e52c413c91805062aeaf3ad05181cdda8dd27ce893b52ad4f6cdfd7a70 |
glusterfs-devel-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: 292094af385d38289b1181a720350d3580641469e7de25b2bc8bc0d2a9fbe1b3 |
glusterfs-events-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: 918e5bf81d48cc525dc553ca1a0a7ed6f4c143159f0159a28d20ef9df1ed4bb6 |
glusterfs-fuse-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: dd48c8107d5434817e3d4b4844ff96b139ff8e7849b7129bc254717e6e362fc6 |
glusterfs-ganesha-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: b67f9370129f40ce5bc146898a4917811abcac8e5ba16b38758dcd9e6fac1ecc |
glusterfs-geo-replication-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: 742003551260d294c7497a8489519e25554c445affb9156787e64826c12145f5 |
glusterfs-libs-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: e886e0d82b5134310cc8323e3fb225a2268a88ed6789a0780bd90a1615a60404 |
glusterfs-rdma-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: 37b05369053cdad29d0d7e32f24ef625b8c5adc00e92e45cc36852cd28d40d84 |
glusterfs-resource-agents-3.12.2-47.el6rhs.noarch.rpm | SHA-256: bf60271fb44c3861a8dceffd4b2ed9863406cc29e86e38036bbf7676349620de |
glusterfs-server-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: c5b4814cc85abced262cda1d8daeee76f4e5db0026498f1a4def6f96bb437a6e |
python2-gluster-3.12.2-47.el6rhs.x86_64.rpm | SHA-256: d174f430fd0ee2169ed015e307d45f4375e28f922261c6a42265d998c2607ae7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.