- Issued:
- 2020-07-23
- Updated:
- 2020-07-23
RHBA-2020:3122 - Bug Fix Advisory
Synopsis
glusterfs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated glusterfs packages that fix several bugs is now available for Red Hat Gluster Storage 3.5 on Red Hat Enterprise Linux 8.
Description
Red Hat Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.
This advisory fixes the following bugs:
- Previously, in an ovirt-gluster hyperconverged environment rebooting one of the hosts killed vms running on the available hosts. The group ‘virt’ has been updated with network related options. With this update, vms on available hosts function normally. (BZ#1848899)
- Previously,replication module did not use eager-lock functionality for fsync fop which affected performance on RHHI/RHV workloads that use fsyncs frequently. With this update, fsync in the replication module uses eager-lock functionality which improves the performance of RHHI/RHV workloads.(BZ#1848896)
- Previously, entry heal was triggered just on the source bricks even when the sink brick was down.This led to the AFR pending-xattrs on the source bricks being reset unintentionally,resulting in gfid split-brains. With this update, entry heal is triggered only when all the bricks of the replica are up, thus preventing such spurious heals leading to gfid split-brains. (BZ#1848893)
All users of glusterfs on Red Hat Gluster Storage are advised to upgrade to this updated packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 8 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
Fixes
- BZ - 1848890 - [GSS] glustershd logs are filling up with error client-rpc-fops.c:1513:client3_3_inodelk_cbk: remote operation failed [Invalid argument]
- BZ - 1848891 - gluster processes are having memory leak after enabling SSL
- BZ - 1848893 - Spurious healing results in heal pending on the volume
- BZ - 1848894 - [SSL]: Memory leak by glusterfsd (issue heal info indefinitely to reproduce) when SSL enabled for Management layer
- BZ - 1849533 - [GSS] - 'gluster volume set <VOLUME> disable.nfs' accidentally killed unexpected process, and forced a data brick offline.
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 8
SRPM | |
---|---|
glusterfs-6.0-37.1.el8rhgs.src.rpm | SHA-256: 1adef85b7563e73a5d45965e426ebffabafbf6937d99f87d1d0d86796623dd67 |
x86_64 | |
glusterfs-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 399dec5f775b16b23f434e7e2535ebcb616bc31b3cb7e4fbe325a17bd7f41735 |
glusterfs-api-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: ca59a473f3ef8c14ed6f8ee7d1355345a0167b7a327f7a4fa8d24e7feb5939a0 |
glusterfs-api-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 32639306d4e57f3a0486c8737d4885f44ec92c947716f74ef73ce54b8cb46608 |
glusterfs-api-devel-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: fe93a8bee37ba059cb8a6a37e8319f078cbbc76e7d867b4876f19d7657c0bce8 |
glusterfs-cli-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 20843079a49b894799ad887016561eccf46cd96de1b303b59b4e33d1d569dfd2 |
glusterfs-cli-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 854a14ac670c86effa878e897dba2af77ec12feefca7306836acd1000f1d9d89 |
glusterfs-client-xlators-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: f6023164d52637ac6d01930306d374ef5fe0f87be91c3d3da8373fa64d2107a1 |
glusterfs-client-xlators-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: ef564118b6b0fffa5a07e76a26eac33bbe6cd4a59e68404c6396e7e7f5e15040 |
glusterfs-cloudsync-plugins-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 25becb4115b0ec990e7fa2faf5229b715811bbc9a221db273766090e8e6bb809 |
glusterfs-cloudsync-plugins-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 8c6885bd800fb009783c7cf530e7643ebe40e9fea50578287844a8dff817aadc |
glusterfs-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: d366443de078298435ffe5b696efdca454061a1a45d20022f37e233badfe52e4 |
glusterfs-debugsource-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 19202fc1d720436dea57335a4ff5085dda7d8a941ff55ac0fabe2597b3a3a2f3 |
glusterfs-devel-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 48b86fb5bc9ad9370aafffdf9453cef02bf91eac3dd91aa99f0af4a5b83c8d18 |
glusterfs-events-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 8a5380e00906531c97beb276a659fdcfb92aafe570416daff47e63080a7e8840 |
glusterfs-fuse-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: cc8e0784643ec2b649767f9880f1ea826bff4951cd31150eb2fb899b23f853eb |
glusterfs-fuse-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: be08be87e13d437837b15640e0eaa22cb97c8eb5b0ede39c18f3bfbe2440196d |
glusterfs-ganesha-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: fb910b0a45800729f5327e36ac022e91dd7f0c40f256fb4b0ccd86fb530e677b |
glusterfs-geo-replication-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 17b8803e328b195df6b99e7fcc5c74945b2bb9cfa74ddb98a9b4ececbb8e6cff |
glusterfs-geo-replication-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 206a4a7153718f2b5c441c96c34198262104126b6cc3c39be28f0d67e8c06566 |
glusterfs-libs-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 50ed7998edcb67241ae56fb0e12bf18fb831b2577486209eff5f7452563ad4d1 |
glusterfs-libs-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 0cfc28c9fb3d86c5e5a1a35c8d5414dd7b5dbcc2989b2275dfec590c87e86e05 |
glusterfs-rdma-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 0e0b72386cce7eed114e761eb89a1c3fcef50799954dd26f9ef4b0047a6dc461 |
glusterfs-rdma-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 4497a269c16b32affa95d69aa85c7694729c9bd7a5abf062e41fb6d316a27c37 |
glusterfs-server-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 90d4a390788f81fb28ef7e2cb114b840e1c046c31e827f092d94ac3dc50eee29 |
glusterfs-server-debuginfo-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: c16ca044d2271d4f455d0d4cbed47523f1c3898c209a8840af19c3226894d1a2 |
python3-gluster-6.0-37.1.el8rhgs.x86_64.rpm | SHA-256: 8edf23e1e371fadc8149c5ee7222532b2ee87f92edbe651e4aed373b31f35ead |
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
glusterfs-6.0-37.1.el8.src.rpm | SHA-256: a0bd8121cd198f6925287d7738ebdd2faf3f49a4902363e9774994d7e6fa63cd |
x86_64 | |
glusterfs-6.0-37.1.el8.x86_64.rpm | SHA-256: 1c69890b6cac13ce787e5688327b847eaebb8a2318e238a83157d8c84f2993e8 |
glusterfs-api-6.0-37.1.el8.x86_64.rpm | SHA-256: b0eec9d19ec24a7b1ba8297119ba86cadf22a47369d273aff18b7fdbd380f369 |
glusterfs-api-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: 99790a6eb7e5a49660102769ce7df5ff251e794b48adff0d9deae9dac7608344 |
glusterfs-api-devel-6.0-37.1.el8.x86_64.rpm | SHA-256: 5fbcdf980e175fe599556abf0ce5e9fecb5a58e1d394adf1f68865a5659342d0 |
glusterfs-cli-6.0-37.1.el8.x86_64.rpm | SHA-256: 9d4a2493495d5c1aa84ea68df05da037e42d58d9e1734958f6ba75f098c138fb |
glusterfs-cli-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: 1bc7e9db60da029dfea885241a1daa8982d65bc8c1157d40eac44a7ed3a4e8c4 |
glusterfs-client-xlators-6.0-37.1.el8.x86_64.rpm | SHA-256: f5f9a04a461571232fa7ec04857a62d9e8bbef0cc517349e35816f5e5d5bdd2f |
glusterfs-client-xlators-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: 375da223b9b1e00a1af5a5380854c828e34f27962ca4d1a97ef568ff77c37c14 |
glusterfs-cloudsync-plugins-6.0-37.1.el8.x86_64.rpm | SHA-256: 8c8565ffaeb3a2c8f3eade5d90a7b3d6e9b34cacfec70f7cb9217c6438951737 |
glusterfs-cloudsync-plugins-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: 5cd12f306b100230605e4ba789b091bc7b7658d572ca97d527335217f3ca0288 |
glusterfs-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: be0cfb6211675dd9a66f7880dd1a6c74ef3681c6ba4050a5172ae805765b02e0 |
glusterfs-debugsource-6.0-37.1.el8.x86_64.rpm | SHA-256: f710ea570b8309d448b316b50dd84dfc264130da97c6479b64875149f0f98cb2 |
glusterfs-devel-6.0-37.1.el8.x86_64.rpm | SHA-256: c1e6ba2cd0cc5dcb32f026611dc498609776a7ca55378226fa3583dde7f01ea6 |
glusterfs-fuse-6.0-37.1.el8.x86_64.rpm | SHA-256: f349deae6b6932785a5bff0319f717209322c69e89d2aab38cb60f5b741127c8 |
glusterfs-fuse-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: 7836c0be14cd5124b91e02fea09f709e74f00f6423140ad093ced9b9ae9a2ff8 |
glusterfs-libs-6.0-37.1.el8.x86_64.rpm | SHA-256: 1ed142cfdd8305470e176a19a7602c65a7fec181d2405a1a83c101c3f8ee2b46 |
glusterfs-libs-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: c40125967a7f32ef8f9d758d56b62ab6be87d9afe67379a72fd5fba5be9692fc |
glusterfs-rdma-6.0-37.1.el8.x86_64.rpm | SHA-256: 0003a44fe44b04929edb086debcbe53b3dda469cab4cf034a58d09c639667bb1 |
glusterfs-rdma-debuginfo-6.0-37.1.el8.x86_64.rpm | SHA-256: 2f83be26e8405c010b817edf1288c6e923b0b61c42ee90790d4ea89201baa13f |
python3-gluster-6.0-37.1.el8.x86_64.rpm | SHA-256: 5ba8f42605f2057fb0bf484f8d19edb35827a090c0d792a0953ec04b44a7ff67 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.