- Issued:
- 2010-07-29
- Updated:
- 2010-07-29
RHBA-2010:0537 - Bug Fix Advisory
Synopsis
vdsm22 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm22 packages that fix several bugs are now available for Red Hat
Enterprise Linux 5.5.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager (RHEV-M) agent on Red Hat Enterprise Virtualization Hypervisor (RHEV-H)
or Red Hat Enterprise Linux hosts.
Note: this update has been tested and is supported on Red Hat Enterprise Linux
5.5 (with all appropriate post-GA 5.5-specific updates).
These updated vdsm22 packages fix the following bugs:
- the vdsm22 package used to add a line to /etc/sudoers that allowed VDSM to run
all commands with root privileges, which could be potentially dangerous;
however, note that from a guest's point-of-view, VDSM runs with privileges
equivalent to root anyway. This has been fixed, and the configuration file now
contains an explicit list of commands that are required to run with root
privileges in order for VDSM to operate correctly. (BZ#496600)
- using a different time zone than Coordinated Universal Time (UTC) on a host
system caused QEMU to emit an event with an incorrect offset when the hardware
clock of the guest was changed. With this update, this value is always correct
regardless of the time zone configuration. (BZ#595776)
- when a Linux guest is shut down, its system date is captured by QEMU and
reported to VDSM. However, there was only a short period of time between this
event and the termination of QEMU itself when Red Hat Enterprise Virtualization
Manager (RHEV-M) could react. To avoid the impending race condition, VDSM now
reports the last known time offset of the shut down virtual machine. (BZ#597770)
- logical volumes of running virtual machines are now refreshed when VDSM is
restarted. (BZ#598392)
- under certain circumstances, a race condition could arise, preventing the
storage domain from being reconstructed. (BZ#600834)
- after migration, a race condition could prevent the logical volume on the
target host from being refreshed properly. (BZ#600888)
- attempting to import the previously exported domain on another Red Hat
Enterprise Virtualization Manager (RHEV-M) led to the following error message:
There is no Import Domain under the specified path. Check path.
As a result, it was nearly impossible to move virtual machines between systems
using the export domain. This has been fixed, and moving the virtual machines
now works as expected. (BZ#600903)
- refreshing of the volume group configuration is no longer triggered by a
message that is sent to standard error (STDERR). (BZ#601103)
- previously, VDSM did not get an exclusive lock on the storage pool, which
could not only make it impossible to attach the storage domain, but it could
also leave the host in a non-operational state. (BZ#601112)
- a race condition could arise when the allocated storage space was exceeded.
(BZ#601643)
- lvextend now handles messages correctly. (BZ#601649)
- these updated vdsm22 packages now require version 0.4.7-34 of the
device-mapper-multipath package for Red Hat Enterprise Linux 5.4. Installing
this update will upgrade device-mapper-multipath to that version or later.
(BZ#603130)
- on a fibre channel storage, adding a new data domain to the cluster with more
than two hosts could result in an error. (BZ#603654)
- due to the incorrect filtering of restricted characters in XML-RPC responses,
certain messages from the guest could cause all virtual machines on the same
host to become unresponsive. This has been fixed, and forbidden characters in
the XML-RPC responses no longer affect the virtual machines. (BZ#606281)
- several missing logs have been added to the Red Hat Enterprise Virtualization
Manager (RHEV-M) log collector. (BZ#607709)
- importing an existing storage domain into Red Hat Enterprise Virtualization
Manager (RHEV-M) now works as expected. (BZ#611283)
RHEV-M 2.2 users with Red Hat Enterprise Linux hosts should install these
updated packages, which resolve these issues. Alternatively, RHEV-M can install
the new package automatically.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Virtualization 3 for RHEL 5 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 5
SRPM | |
---|---|
vdsm22-4.5-62.9.el5_5rhev2_2.src.rpm | SHA-256: b0132b9145caca20b92365541942f02a9ce0d32f230e109ee26c587cba63540f |
x86_64 | |
vdsm22-4.5-62.9.el5_5rhev2_2.x86_64.rpm | SHA-256: 91a68871f5584e68d5915760a1e61ea752e54ee3af336343186f4eeb1eaf64c5 |
vdsm22-cli-4.5-62.9.el5_5rhev2_2.x86_64.rpm | SHA-256: dbb371d2fc196eac859a9c98308beef05b237762cce6992c6122f7830176ec11 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.