- Issued:
- 2018-01-11
- Updated:
- 2018-01-11
RHBA-2018:0085 - Bug Fix Advisory
Synopsis
nfs-ganesha bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated nfs-ganesha packages that fix a bug are now available for Red Hat
Gluster Storage 3.3.1 Update 1 on Red Hat Enterprise Linux 7.
Description
NFS-Ganesha is a user space file server for the NFS protocol with support for NFSv3, v4, v4.1, pNFS.
This advisory fixes the following bug:
- A lock request is received when a client opts for an open call. But in
ganesha, for every lock request, a different file descriptor is accessed
internally. If a file with a specific file descriptor is removed by a
client, other clients receive a 'No such file or directory' error, while
trying to access the same file with the same file descriptor. With this fix,
lock requests use the same file descriptor obtained from the open call.
Thus, the additional open call in the lock handling path is not required.
(BZ#1526378)
Users of NFS-Ganesha with Red Hat Gluster Storage are advised to update to
this package.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
nfs-ganesha-2.4.4-18.el7rhgs.src.rpm | SHA-256: 2b028a7c9d1240fde6547cd7bd2e82b95eed87507429bd160cec9fa361e5b29a |
x86_64 | |
nfs-ganesha-2.4.4-18.el7rhgs.x86_64.rpm | SHA-256: d7af044be1895b2275890577b2553a184f4cc1def8c5987bc0022401b6a44340 |
nfs-ganesha-debuginfo-2.4.4-18.el7rhgs.x86_64.rpm | SHA-256: 93ac4da47c5551569efda3cc55e7b733ef248a98b90dc32352278e68fcdc4969 |
nfs-ganesha-gluster-2.4.4-18.el7rhgs.x86_64.rpm | SHA-256: 5227c8cd53e2cce8d33f376eff45fbdf1a815fe63731dbe14e90f67f6a20fb18 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.