Security update for glusterfs

This update for glusterfs fixes the following issues:

- Update to release 11.2
* Next minor release tentative date: Release will be based on requirement
only
* Users are highly encouraged to upgrade to newer releases of GlusterFS.
* Important fixes in this release
- Regression suite tests failures are addressed
- Fixed notify stack-based buffer over-read (boo#1208519, CVE-2023-26253)

- Update to release 11.1
* Fix upgrade issue by reverting posix change related to
storage.reserve value
* Fix possible data loss during rebalance if there is any
linkfile on the system

- Disable IO_uring for now [boo#1210894]

- Update to release 11 [boo#1208517] [boo#1208519]
* Major performance impovement of ~36% with rmdir operations
* Extension of ZFS support for snapshots
* Qouta implimentation based on namespace
* Major cleanups and readdir/readdirp improvements
* Fixed use-after-free in dht_setxattr_mds_cbk (CVE-2022-48340)

- Update to release 10.2
* Some 165 bugfixes with none particularly sticking out

Fixed bugs
bnc#1208519
VUL-0: CVE-2023-26253: glusterfs: out-of-bounds read in notify
bnc#1210894
Broken status, peer probe, "DNS resolution failed on host" and "Error disabling sockopt IPV6_V6ONLY: "Protocol not available" in glusterfs
bnc#1212476
patch shebang line match the python version required in the package
bnc#1208517
VUL-0: CVE-2022-48340: glusterfs: use-after-free in dht_setxattr_mds_cbk
Selected Binaries
openSUSE Build Service is sponsored by