Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1385663 - [RHEL6] Back port changes in shadow copy module for VSS support from upstream
[RHEL6] Back port changes in shadow copy module for VSS support from upstream
Status: CLOSED ERRATA
Product: Red Hat Gluster Storage
Classification: Red Hat
Component: samba (Show other bugs)
3.2
Unspecified Unspecified
unspecified Severity unspecified
: ---
: RHGS 3.2.0
Assigned To: Michael Adam
Vivek Das
:
Depends On:
Blocks: 1351528 1386227
  Show dependency treegraph
 
Reported: 2016-10-17 09:07 EDT by Anoop C S
Modified: 2017-03-23 01:12 EDT (History)
6 users (show)

See Also:
Fixed In Version: samba-4.4.6-2.el6rhs
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1386227 (view as bug list)
Environment:
Last Closed: 2017-03-23 01:12:29 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0494 normal SHIPPED_LIVE Moderate: Red Hat Gluster Storage 3.2.0 samba security, bug fixes and enhancement update 2017-03-23 05:06:59 EDT

  None (edit)
Description Anoop C S 2016-10-17 09:07:45 EDT
Description of problem:

Since shadow copy patches for VSS support with Samba and RHGS have undergone changes in upstream master(Samba) we need to back port those into downstream so that both upstream and downstream code base are in sync.
Comment 6 Vivek Das 2016-10-25 07:48:36 EDT
Based on comment 5 marking it as verified.
Comment 8 errata-xmlrpc 2017-03-23 01:12:29 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2017-0494.html

Note You need to log in before you can comment on or make changes to this bug.