- Issued:
- 2016-09-21
- Updated:
- 2016-09-21
RHBA-2016:1927 - Bug Fix Advisory
Synopsis
ioprocess bug fix update for RHV 3.6
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ioprocess packages are now available.
Description
The ioprocess package provides a process pool that provides a single process that can serve multiple IO requests.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 3 ppc64le
Fixes
- BZ - 1371634 - ioprocess keep open file on shared storage after touching or truncating a file
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
ioprocess-0.15.2-1.el7ev.src.rpm | SHA-256: 8ad942ccfab8489f4c3fe3aa3b0160f8e9025024020d6ebde43567a55fb44616 |
x86_64 | |
ioprocess-0.15.2-1.el7ev.x86_64.rpm | SHA-256: 125eabbd849f4c87391973f764cfafeddc4adc744adbc1a0f4ce88529c21a76b |
ioprocess-debuginfo-0.15.2-1.el7ev.x86_64.rpm | SHA-256: 04c55ed0ae6e693908f83949e5f47a9798199d067dba44f7c5a8fdce6348cc87 |
python-ioprocess-0.15.2-1.el7ev.noarch.rpm | SHA-256: ad96f2ca2d37498c1f120828d2276b54b4084b97035180e89ab79695c4fb5fcb |
Red Hat Virtualization for IBM Power LE 3
SRPM | |
---|---|
ioprocess-0.15.2-1.el7ev.src.rpm | SHA-256: 8ad942ccfab8489f4c3fe3aa3b0160f8e9025024020d6ebde43567a55fb44616 |
ppc64le | |
ioprocess-0.15.2-1.el7ev.ppc64le.rpm | SHA-256: efdb760416da1ce91339c2df3d62c5dd16fe530bc3ddfc617b3b8012b8b86afb |
ioprocess-debuginfo-0.15.2-1.el7ev.ppc64le.rpm | SHA-256: 06a16b8a08adb3001aa040a320a9250306f07dd7a0f4e91367b005bdef6bb0cd |
python-ioprocess-0.15.2-1.el7ev.noarch.rpm | SHA-256: ad96f2ca2d37498c1f120828d2276b54b4084b97035180e89ab79695c4fb5fcb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.