- Issued:
- 2010-01-26
- Updated:
- 2010-01-26
RHBA-2010:0067 - scsi-target-utils bug fix and enhancement update
Synopsis
scsi-target-utils bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
An updated scsi-target-utils package that fixes various bugs is now available.
Description
The scsi-target-utils package contains the daemon and tools to set up and monitor SCSI targets. Currently, iSCSI software and iSER targets are supported.
This updated scsi-target-utils package includes fixes for the following bugs:
-
the tgtadm utility is used to monitor and modify SCSI target software. When using tgtadm to present an LVM-backed target to clients, attempting to create a new file system by running the mkfs utility on a logical volume caused the tgtd daemon to become unresponsive and connection errors to be logged to /var/log/messages. With this update, clients are once again able to successfully create a new file system on an LVM logical volume. (BZ#545785)
-
running the command "tgtadm --mode connection --op delete" to instruct tgtadm to close and remove an open connection to a target which has ongoing I/O caused the tgtadm utility to segmentation fault. Subsequently, attempting to stop the tgtd daemon by running "service tgtd stop" failed and resulted in error messages. With this update, it is now possible to use tgtadm to close and remove an open connection to a target which is undergoing I/O without causing tgtadm to crash, and subsequently stopping or restarting the tgtd service proceeds as expected. (BZ#545786)
-
attempting to create 32 or more iSCSI targets using tgtadm caused the utility to segmentation fault after successfully creating the first 31 targets. This update fixes this limitation so that tgtadm does not segmentation fault when creating large numbers of targets, such as 400 or more. (BZ#552928)
-
the /etc/tgt/targets.conf file now supports more advanced configuration parameters. Refer to the tgt-admin(8) manual page for further information about valid parameters for the /etc/tgt/targets.conf file.
All users of scsi-target-utils are advised to upgrade to this updated package, which resolves these issues.
Solution
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux Resilient Storage for x86_64 | 5 | x86_64 |
| Red Hat Enterprise Linux Resilient Storage for x86_64 | 5 | ppc |
| Red Hat Enterprise Linux Resilient Storage for x86_64 | 5 | ia64 |
| Red Hat Enterprise Linux Resilient Storage for x86_64 | 5 | i386 |
| Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support | 5.4 | x86_64 |
| Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support | 5.4 | ppc |
| Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support | 5.4 | ia64 |
| Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support | 5.4 | i386 |
| Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI | 5 | i386 |
Updated Packages
- scsi-target-utils-0.0-6.20091205snap.el5_4.1.i386.rpm
- scsi-target-utils-0.0-6.20091205snap.el5_4.1.ia64.rpm
- scsi-target-utils-0.0-6.20091205snap.el5_4.1.x86_64.rpm
- scsi-target-utils-0.0-6.20091205snap.el5_4.1.ppc.rpm
- scsi-target-utils-0.0-6.20091205snap.el5_4.1.src.rpm
Fixes
- This content is not included.BZ - 545785
- This content is not included.BZ - 545786
- This content is not included.BZ - 552928
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.