- Issued:
- 2021-04-29
- Updated:
- 2021-04-29
RHBA-2021:1459 - Bug Fix Advisory
Synopsis
nfs-ganesha bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated nfs-ganesha packages that fixes several bugs, and add various enhancements are now available for Red Hat Gluster Storage 3.5 on Red Hat Enterprise Linux 7.
Description
Red Hat Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
This advisory fixes the following bugs:
- Previously, the local RPCBIND service hung because the connected sockets were not closed properly, causing failures. With this update, the sockets are closed properly when not needed and the system works as expected. (BZ#1889506)
- With this update,`ganesha.nfsd` can be run as a non-root user. Running as a non- root user, ensures less vulnerability to privilege escalation attacks. Additionally container frameworks prefer to run daemons as non-root. (BZ#1934533)
- Previously, NFSV3 UDP client mounts failed due to incorrect source address in the mount reply as controlmsg and pktinfo were truncated in rcvmsg(2). With this update, the handling of controlmsg is revised and the mount reply returns the correct source address. (BZ#1782937)
- Previously, Ganesha crashed because of specific NFSv3 locking operations. With this update, locking works as expected and there are no crashes. (BZ#1902843)
- Previously, running ganesha.nfsd as a non root user resulted in attempts to create files(extracted from the tar file) or delete files that resulted in permission denied errors. NFS wire credentials were not being set in the lookup op FSAL_GLUSTER's lookup(); i.e. the wrong credentials like uid and gid were used to access files.
With this update, ganesha.nfsd can be run as a non root user and NFS clients can create and delete files. (BZ#1934536)
- The `nfs-ganesha` package has been upgraded to upstream version 3.4, which provides a number of bug fixes and enhancements over the previous version,for better performance and greater stability.(BZ#1907588)
Users of nfs-ganesha with Red Hat Gluster Storage are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1889506 - [GSS] [rhel-7] rpcinfo -p localhost shows only nlockmgr version 4
- BZ - 1902843 - [nfs-ganesha] [rhel7] nfs-ganesha service goes in to failed state and a crash is noticed while running lock test
- BZ - 1903976 - [nfs-ganesha] [rhel 7] showmount -e command failing with error "rpc mount export: RPC: Timed out"
- BZ - 1907588 - [RFE][REBASE]: [rhel7] nfs-ganesha: rebase to upstream ntirpc-3.x and nfs-ganesha-3.x
- BZ - 1934531 - [ERRATA] [rhel7] Verification test fails for /run/ganesha .....UG.. [tps:B] error
- BZ - 1934533 - [RFE][Future Feature] [rhel7] NFS-Ganesha in RHGS - Run as non-root user
- BZ - 1934536 - [Ganesha] [rhel7] Linux untar on NFS mount point resulting in "Permission Denied" when ganesha is running as non-root user
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
| SRPM | |
|---|---|
| libntirpc-3.4-2.el7rhgs.src.rpm | SHA-256: 112836afb3678e058907bb64ad9547125a1cfccce96cf97c28db7f29c522edc4 |
| nfs-ganesha-3.4-2.el7rhgs.src.rpm | SHA-256: 22f9f148d74b97de23d05ba8d5b2ebffb91fefe2c90960f1da2f8ac3eef51676 |
| x86_64 | |
| libntirpc-3.4-2.el7rhgs.x86_64.rpm | SHA-256: e1653671fddbbe94f764248fb170bdbf62762bc6c696338d1c1143757888e743 |
| libntirpc-debuginfo-3.4-2.el7rhgs.x86_64.rpm | SHA-256: aff51b7a0cf1b8bb5e6ad71b3ddc55e0166472da97592aa332e550b9f590113f |
| libntirpc-devel-3.4-2.el7rhgs.x86_64.rpm | SHA-256: 841ad4b3116948231adce2885466c04143c5801c5c171d5a4c7c745b3e0d5db6 |
| nfs-ganesha-3.4-2.el7rhgs.x86_64.rpm | SHA-256: 953660e3a924ac722b57face2a74425dcc7d31f19d537087ef7a5c21b8baf9d7 |
| nfs-ganesha-debuginfo-3.4-2.el7rhgs.x86_64.rpm | SHA-256: 376cd672442d3a80bf033248af916e22602817fa1371537f7dd7c96a5481c161 |
| nfs-ganesha-gluster-3.4-2.el7rhgs.x86_64.rpm | SHA-256: c86f83c9452f8755a950a7fd40b5ac27451a15e87ad23b19498c944f9e0fe82b |
| nfs-ganesha-selinux-3.4-2.el7rhgs.noarch.rpm | SHA-256: 6be9a7b5ef5f851c966483c3224433efc001128fab0b09310c0d264b8851196e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.