- Issued:
- 2014-12-02
- Updated:
- 2014-12-02
RHBA-2014:1946 - Bug Fix Advisory
Synopsis
vdsm 3.4.4 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages are now available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Changes to the vdsm component:
- The issue_lip operation introduced in RHEV 3.4.3 to fix a failure to discover
new LUNs on Fibre Channel regression introduced in RHEV 3.4.0 has been found to
be disruptive on some storage servers and caused storage connection issues.
Domains became inaccessible on random occasions. With this update, the issue_lip
operation is disabled by default. As a result, discovering new LUNs on Fibre
Channel storage server is not supported by default. Users can enable this option
through new vdsm configuration (hba_rescan) if this option is compatible with
the storage server. A future RHEV version will support discovering new LUNs by
default. (BZ#1157681)
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3.4 x86_64
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1139522 - GlusterSD symlink is not created under storage pool directory, thus preventing VMs to be started
- BZ - 1142691 - qcow2 images created on rhel7 hosts are unreadable on rhel6 hosts
- BZ - 1148772 - vdsm: ssl_accept may block connections on uncompleted handshake
- BZ - 1150503 - vdsClient is not showing the correct information of the VM
- BZ - 1152431 - vdsm fails to configure libvirt module when yum updating from 4.10 version to 4.14
- BZ - 1157227 - vdsm does not set selinux booleans during installation when selinux disabled
- BZ - 1157681 - vdsm-4.14.13-2 sends FC LIP events on storage actions
- BZ - 1157688 - External luns may loose the libvirt selinux label if a udev change event is triggered
CVEs
(none)
References
(none)
Red Hat Virtualization 3.4
SRPM | |
---|---|
vdsm-4.14.18-4.el6ev.src.rpm | SHA-256: c84332c8e8a55133c25599b883f36820c6b7f126c6aa0cd7093ae983c0a0c4cb |
x86_64 | |
vdsm-bootstrap-4.14.18-4.el6ev.noarch.rpm | SHA-256: 69f99b70765392d9c445f96decc0fc51e4e8c403dee9a7851e17a8a82117e468 |
vdsm-debuginfo-4.14.18-4.el6ev.x86_64.rpm | SHA-256: a3bad840c5084b9b56add31929dd9b1fe39b87ad7322a522d6b3ffa26d1e5f05 |
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
vdsm-4.14.18-4.el7ev.src.rpm | SHA-256: de2f293f25d95e30eb99a2febb98123c05dd55030869581bf7229f3b5514fc99 |
x86_64 | |
vdsm-4.14.18-4.el7ev.x86_64.rpm | SHA-256: 8f95e5d6490ee349c77a7ec43efa8f63675c7bdb3d803ef3358470fb31be889c |
vdsm-cli-4.14.18-4.el7ev.noarch.rpm | SHA-256: ac96780e4e38c4de4a32ff28a88c1a24fec57147ae0eb8c395d07f4fe91ec8c0 |
vdsm-debug-plugin-4.14.18-4.el7ev.noarch.rpm | SHA-256: 8614ae6a9511152b8e73208af322cccfe81a60ccd09add4ea3297f4446397a9c |
vdsm-debuginfo-4.14.18-4.el7ev.x86_64.rpm | SHA-256: 70304bb74adaacccc44fd7955564783ef716b33d174f0084cb534f4113e08853 |
vdsm-hook-vhostmd-4.14.18-4.el7ev.noarch.rpm | SHA-256: 81046745b4bd3df2eeaa6ea0a475385e86dfe75afa576734543b315652a94ac2 |
vdsm-python-4.14.18-4.el7ev.x86_64.rpm | SHA-256: e0044eef4418c16c07de4846ac3a406ebadafa57ffe8cf1731b12b4f8f58c919 |
vdsm-python-zombiereaper-4.14.18-4.el7ev.noarch.rpm | SHA-256: 364b65ceea8ed96be70ad113c4932ea5bd5a11032f806383636e55c73470035b |
vdsm-reg-4.14.18-4.el7ev.noarch.rpm | SHA-256: a628103a296be70b5b0b51ca32f6f423d7389b7c8baba9b18eb0e40886b083cd |
vdsm-xmlrpc-4.14.18-4.el7ev.noarch.rpm | SHA-256: 6bddf03dafee82067fff39d0aafacec01b9b1a9188c4950e112ccc19205d4989 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.14.18-4.el6ev.src.rpm | SHA-256: c84332c8e8a55133c25599b883f36820c6b7f126c6aa0cd7093ae983c0a0c4cb |
x86_64 | |
vdsm-4.14.18-4.el6ev.x86_64.rpm | SHA-256: ec1007aca992d5a681aa6a62c733583b9aeb6158769345ea824c0c6d8b77718b |
vdsm-cli-4.14.18-4.el6ev.noarch.rpm | SHA-256: 9cdad9113c2dcd894a739fc98d67b01bb1ac4e26ef1c56f91e73ac228c0800a7 |
vdsm-debuginfo-4.14.18-4.el6ev.x86_64.rpm | SHA-256: a3bad840c5084b9b56add31929dd9b1fe39b87ad7322a522d6b3ffa26d1e5f05 |
vdsm-hook-vhostmd-4.14.18-4.el6ev.noarch.rpm | SHA-256: 8983c0cacfa4fade21cb8602cc1a59053df16c0eb29d3e9c25feddd082899470 |
vdsm-python-4.14.18-4.el6ev.x86_64.rpm | SHA-256: 82a91720fb05a5b635a1aae5b99f72a962a562261aa5370721895fc93321071b |
vdsm-python-zombiereaper-4.14.18-4.el6ev.noarch.rpm | SHA-256: b26260710ac050900dcd34bc4ecd615eed56a993e9c7191cbb0d27a15d8b4471 |
vdsm-reg-4.14.18-4.el6ev.noarch.rpm | SHA-256: fd04cc4995d7b80efdf7836b952be84ef4b51100ca7c7997606eae4968d9280e |
vdsm-xmlrpc-4.14.18-4.el6ev.noarch.rpm | SHA-256: 9a5fcde515552a47c5f9694be60c1ee71b78b3705754560f769bc8d0bf1a2ba1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.