Skip to navigation

Bug Fix Advisory scsi-target-utils bug fix and enhancement update

Advisory: RHBA-2011:0734-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-19
Last updated on: 2011-05-19
Affected Products: Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated scsi-target-utils package that fixes multiple bugs and adds an
enhancement is now available.

The scsi-target-utils package contains tools and a daemon used to set up
iSCSI and iSER targets.

This updated package also contains a number of bug fixes:

* Providing an existing target name to tgt-setup-lun when attempting to
add a new LUN based on a non-existent device correctly resulted in failure
because a target with the same name already existed. If the user then
followed the utility's suggestion to add the new LUN to the existing
target, the operation failed (again, correctly) because the device did
not exist. However, the roll-back action associated with this second
failure resulted in the target being removed. The roll-back action now
checks whether the target pre-existed the failed actions, so the target
is not removed in this circumstance. (BZ#676337)

* Attempting to run iscsid and the tgtd on the same machine results
in semaphore errors being logged by both daemons because of an identifier
collision. This has been corrected, and these errors no longer appear.
(BZ#677475)

This update also includes the following enhancement:

* Support for read-only target devices has been added to
scsi-target-utils. Set read-only devices with the "--params" option of
the tgtadm command, like so:

tgtadm --lld iscsi --mode logicalunit --op update --tid 1 --lun 1 --params
readonly=1

...or add "readonly 1" to the target element of your targets.conf file.
Note that "allow-in-use" must also be set if you enable read-only targets
in the targets.conf file. (BZ#616402)

All users of scsi-target-utils are advised to upgrade to this updated
package, which resolves these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Server (v. 6)

SRPMS:
scsi-target-utils-1.0.14-2.el6.src.rpm
File outdated by:  RHBA-2013:1684
    MD5: 0e70c1430565bb9a9bbced5377b9d1b0
SHA-256: b08377c4b8303ca3a445987296d5f288fcdf9ed03539f3f0cc8b4559afeccc91
 
IA-32:
scsi-target-utils-1.0.14-2.el6.i686.rpm
File outdated by:  RHBA-2013:1684
    MD5: 77529c7b89df236bc7ceca543aceede8
SHA-256: 21e363b033c6346a7b6c7412d6b3a88186778910db8369a252f8d815ec4c2da8
scsi-target-utils-debuginfo-1.0.14-2.el6.i686.rpm
File outdated by:  RHBA-2013:1684
    MD5: a8abeb50b156b374de2b6fd1c775d70e
SHA-256: 580fc37f8815aa070bdc694725e8754124c2433f6339cbc067649d41f52c980b
 
PPC:
scsi-target-utils-1.0.14-2.el6.ppc64.rpm
File outdated by:  RHBA-2013:1684
    MD5: be7c9b37eb754b515b9e82f946d91d9e
SHA-256: 30de919207274f55338e2c8eddd9a144df4b5c37dcdd658ddc69eb3de58be887
scsi-target-utils-debuginfo-1.0.14-2.el6.ppc64.rpm
File outdated by:  RHBA-2013:1684
    MD5: 118bf0ea3d039356a1c7e263a53d3d83
SHA-256: 2952ff597b874943198ac98736615bddf8880c75791fade1e8d77eddebf9b22b
 
x86_64:
scsi-target-utils-1.0.14-2.el6.x86_64.rpm
File outdated by:  RHBA-2013:1684
    MD5: 437604d7f6b417b6cbe20e6508e6cf1c
SHA-256: b0f7e9c9fe5a7e18b1f014bd1ad5c39457876c2b1c854c5196c01f509ec87a7d
scsi-target-utils-debuginfo-1.0.14-2.el6.x86_64.rpm
File outdated by:  RHBA-2013:1684
    MD5: 067756615044f0f489482016310f8349
SHA-256: c74cdba32454e70871bb2d77dde6a309f03c85cc14e6d6835193a172e5fe9e86
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
scsi-target-utils-1.0.14-2.el6.src.rpm
File outdated by:  RHBA-2013:1684
    MD5: 0e70c1430565bb9a9bbced5377b9d1b0
SHA-256: b08377c4b8303ca3a445987296d5f288fcdf9ed03539f3f0cc8b4559afeccc91
 
IA-32:
scsi-target-utils-1.0.14-2.el6.i686.rpm
File outdated by:  RHBA-2013:1684
    MD5: 77529c7b89df236bc7ceca543aceede8
SHA-256: 21e363b033c6346a7b6c7412d6b3a88186778910db8369a252f8d815ec4c2da8
scsi-target-utils-debuginfo-1.0.14-2.el6.i686.rpm
File outdated by:  RHBA-2013:1684
    MD5: a8abeb50b156b374de2b6fd1c775d70e
SHA-256: 580fc37f8815aa070bdc694725e8754124c2433f6339cbc067649d41f52c980b
 
x86_64:
scsi-target-utils-1.0.14-2.el6.x86_64.rpm
File outdated by:  RHBA-2013:1684
    MD5: 437604d7f6b417b6cbe20e6508e6cf1c
SHA-256: b0f7e9c9fe5a7e18b1f014bd1ad5c39457876c2b1c854c5196c01f509ec87a7d
scsi-target-utils-debuginfo-1.0.14-2.el6.x86_64.rpm
File outdated by:  RHBA-2013:1684
    MD5: 067756615044f0f489482016310f8349
SHA-256: c74cdba32454e70871bb2d77dde6a309f03c85cc14e6d6835193a172e5fe9e86
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

616402 - RFE: Enforce read-only target
676337 - [tgt-setup-lun] - adding inaccurate LUN to existing target will remove the target itself
677475 - iscsid: semop down failed; tgtd: semop up failed



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/