- Issued:
- 2021-04-29
- Updated:
- 2021-04-29
RHBA-2021:1459 - nfs-ganesha bug fix and enhancement update
Synopsis
nfs-ganesha bug fix and enhancement update
Type/Severity
Bug Fix Advisory None
Topic
Updated nfs-ganesha packages that fixes several bugs, and add various enhancements are now available for Red Hat Gluster Storage 3.5 on Red Hat Enterprise Linux 7.
Description
Red Hat Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.
This advisory fixes the following bugs:
-
Previously, the local RPCBIND service hung because the connected sockets were not closed properly, causing failures. With this update, the sockets are closed properly when not needed and the system works as expected. (BZ#1889506)
-
With this update,
ganesha.nfsdcan be run as a non-root user. Running as a non- root user, ensures less vulnerability to privilege escalation attacks. Additionally container frameworks prefer to run daemons as non-root. (BZ#1934533) -
Previously, NFSV3 UDP client mounts failed due to incorrect source address in the mount reply as controlmsg and pktinfo were truncated in rcvmsg(2). With this update, the handling of controlmsg is revised and the mount reply returns the correct source address. (BZ#1782937)
-
Previously, Ganesha crashed because of specific NFSv3 locking operations. With this update, locking works as expected and there are no crashes. (BZ#1902843)
-
Previously, running ganesha.nfsd as a non root user resulted in attempts to create files(extracted from the tar file) or delete files that resulted in permission denied errors. NFS wire credentials were not being set in the lookup op FSAL_GLUSTER's lookup(); i.e. the wrong credentials like uid and gid were used to access files. With this update, ganesha.nfsd can be run as a non root user and NFS clients can create and delete files. (BZ#1934536)
-
The
nfs-ganeshapackage has been upgraded to upstream version 3.4, which provides a number of bug fixes and enhancements over the previous version,for better performance and greater stability.(BZ#1907588)
Users of nfs-ganesha with Red Hat Gluster Storage are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Gluster Storage Server for On-premise | 3 | x86_64 |
Updated Packages
- nfs-ganesha-selinux-3.4-2.el7rhgs.noarch.rpm
- nfs-ganesha-3.4-2.el7rhgs.src.rpm
- nfs-ganesha-gluster-3.4-2.el7rhgs.x86_64.rpm
- libntirpc-3.4-2.el7rhgs.x86_64.rpm
- libntirpc-devel-3.4-2.el7rhgs.x86_64.rpm
- libntirpc-3.4-2.el7rhgs.src.rpm
- libntirpc-debuginfo-3.4-2.el7rhgs.x86_64.rpm
- nfs-ganesha-debuginfo-3.4-2.el7rhgs.x86_64.rpm
- nfs-ganesha-3.4-2.el7rhgs.x86_64.rpm
Fixes
- This content is not included.BZ - 1889506
- This content is not included.BZ - 1902843
- This content is not included.BZ - 1903976
- This content is not included.BZ - 1907588
- This content is not included.BZ - 1934531
- This content is not included.BZ - 1934533
- This content is not included.BZ - 1934536
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.