- Issued:
- 2015-09-03
- Updated:
- 2015-09-03
RHBA-2015:1729 - Bug Fix Advisory
Synopsis
vdsm 3.5.4 - bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now
available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Bug fixes and enhancements with this update include:
Changes to the ovirt-hosted-engine-setup component:
- On Red Hat Enterprise Virtualization Hypervisors, the vdsmd and libvirtd
services experienced restart errors while deploying the Self-Hosted Engine. The
hosted-engine setup script changes the VDSM configuration file and restarts it,
but this is not enough; explicitly calling vdsm-tool configure is also required
to make the changes effective and void any race condition on the services'
start-up. (BZ#1235591)
Changes to the vdsm component:
- Due to a bug in VDSM, ifcfg files that served multiple networks sometimes
contained ONBOOT=no, and as a consequence, rendered management networks (or
other important networks) unavailable during the early stages of boot. As a part
of another change, all ifcfg files are now ONBOOT=yes, thus solving this bug,
and making this scenario impossible. All networks are now loaded by network
service and are not flushed later by VDSM, except in cases where the VDSM
service recognizes them as different from the persistent network configuration.
(BZ#1242508)
- This release defers the ability to use VDSM in cluster versions 3.0 to 3.3.
Over el6, vdsm-3.5 supports all clusters and Managers from 3.0 to 3.5. Over el7
and Fedora, VDSM stops supporting clusters below 3.4 and Managers below 3.3.
Support for 3.4 Managers stays as tech-preview over el7. (BZ#1234320)
- When working with Red Hat Enterprise Linux 7 hosts, the power management
boolean options (true/false options) should have an explicit value (i.e. value=0
or value=1). In the past it was enough to pass "value" when referring to
"value=1". This fix changes that in the database for all known boolean values,
except for cases in which the options are encrypted. If your environment has
encryption enabled for these options, then you have to manually change the host
power management options for Red Hat Enterprise Linux 7 hosts. (BZ#1225082)
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1215236 - "vds.MultiProtocolAcceptor ERROR Unhandled exception" and "SSLError: unexpected eof"
- BZ - 1218637 - vdsm might report interfaces without IP address when using a slow DHCP server
- BZ - 1223053 - [scale] Excessive cpu usage in FileStorageDomain.getAllVolumes
- BZ - 1225082 - After upgrading RHEV-M to 3.5.1 and RHEV-H to 7.1, fencing with ilo4 no longer works
- BZ - 1226709 - [VMFEX_Hook] Migration fail with 'HookError' when using vmfex profile and vdsm-hook-vmfex-dev hook in rhev-M
- BZ - 1229312 - No VM's core dumps after kill vm EL7
- BZ - 1234320 - Vdsm for EL7 should not allow engine version lower than 3.5
- BZ - 1235591 - HE deployment fails due to libvirtError: internal error client socket is closed
- BZ - 1242508 - Having RHEVM network on a bonded VLAN together with other networks screws up network-config files
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
x86_64 | |
vdsm-4.16.26-1.el7ev.x86_64.rpm | SHA-256: 845fc05f192893646f694cdef0e802237e730996c23f26901f4f166ed2eea429 |
vdsm-bootstrap-4.16.26-1.el7ev.noarch.rpm | SHA-256: f1603553e2adfbc092cf22fab8fd76ab598269d15752cdbefad6427240845250 |
vdsm-cli-4.16.26-1.el7ev.noarch.rpm | SHA-256: 2d1feaeba5de1372e1c58a5cb6e44c0055f4e98a840fd6ccb5af12f0fcc44c88 |
vdsm-debuginfo-4.16.26-1.el7ev.x86_64.rpm | SHA-256: 01cc61e52e03994a12602e820aa8b050c6553b0bcc60835587ea5d50b656df24 |
vdsm-hook-ethtool-options-4.16.26-1.el7ev.noarch.rpm | SHA-256: 8c9b8504f2d5d7366255b878bbd376d3d17e9ac9a5b04a7e74bac0ff56ca60dd |
vdsm-hook-macspoof-4.16.26-1.el7ev.noarch.rpm | SHA-256: a53947eb4c859a6a9f0b897a622b2581c1e3957ed6ea433b92d63a7537a78841 |
vdsm-hook-openstacknet-4.16.26-1.el7ev.noarch.rpm | SHA-256: 6c91768170741d785cc50b0ab49b7bfc28cd32eadda2ae493b36c935469ab221 |
vdsm-hook-vhostmd-4.16.26-1.el7ev.noarch.rpm | SHA-256: 9f3d519ecbf6ae53c9808c38bd5c80fb5b4b30263cbce370aba5f63e8324490b |
vdsm-jsonrpc-4.16.26-1.el7ev.noarch.rpm | SHA-256: 40aa32f50229e530942a23554a63ae2f7920152bdc8db84583172d693aabb9fc |
vdsm-python-4.16.26-1.el7ev.noarch.rpm | SHA-256: 45f3dcd0c31a9174bb2ab0f9aa9ccd921babf7ab12114c2a33439ab13c501f57 |
vdsm-python-zombiereaper-4.16.26-1.el7ev.noarch.rpm | SHA-256: 3eb4c86153c15271f8dfb553e6e687894017b8255a7aad59bb20120bd9d4f107 |
vdsm-reg-4.16.26-1.el7ev.noarch.rpm | SHA-256: 5c4b30904b89cb422e19070ec49695f199b49cb409504ea7cfdebc37e84795ff |
vdsm-xmlrpc-4.16.26-1.el7ev.noarch.rpm | SHA-256: 73f0cfc754ae02b20224b558d47e223df0d46061bb4d3aeddce3ff89d58bd8d2 |
vdsm-yajsonrpc-4.16.26-1.el7ev.noarch.rpm | SHA-256: 75b628398370700f005c27016a59c2be342b276c4d26c7f6bdb1428d0bf0b059 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.16.26-1.el6ev.src.rpm | SHA-256: 591ec449b3ed10fa8a68e7e8078adfc76889ae3b17a556d47335b4fb550719ed |
x86_64 | |
vdsm-4.16.26-1.el6ev.x86_64.rpm | SHA-256: 47ab37712cb004ba5f555adc3a24fe94d8c9f8737a102ff8f70008caf412a976 |
vdsm-bootstrap-4.16.26-1.el6ev.noarch.rpm | SHA-256: a223d86911afac0e79ea0bbb98ace9c3bb8b4ab43f671637c6d45f171e2a5235 |
vdsm-cli-4.16.26-1.el6ev.noarch.rpm | SHA-256: 697c4720d49ae17ed001e0c46bbf5aaf5be6e11a46ea5c4a91f8a863875ae354 |
vdsm-debuginfo-4.16.26-1.el6ev.x86_64.rpm | SHA-256: e349c53c1a61d3d16741ef24df4cc046f0897f114024679b6dd31d95a8db271c |
vdsm-hook-ethtool-options-4.16.26-1.el6ev.noarch.rpm | SHA-256: cd9d661bb9eebf2511119115e838377ddc99d0c4af6301e1d1c21d57fdbb56a8 |
vdsm-hook-macspoof-4.16.26-1.el6ev.noarch.rpm | SHA-256: 5868d2a7c24774b32bc424b098bf99858bcb0afef470918b5ffec681b0fe2656 |
vdsm-hook-openstacknet-4.16.26-1.el6ev.noarch.rpm | SHA-256: e0b32c45285ef6707861701f69ae151589fda81cf6b77beaf3541769c4e60ed3 |
vdsm-hook-vhostmd-4.16.26-1.el6ev.noarch.rpm | SHA-256: 6116361362c6a32645e05e5d2f9244597d941c8cbb0daa9bfddd9ec70c0a737a |
vdsm-jsonrpc-4.16.26-1.el6ev.noarch.rpm | SHA-256: c93304a178875dbedeeabd6c984be5407597f4f7ed40bdd4e0f4bf2fa752b9e2 |
vdsm-python-4.16.26-1.el6ev.noarch.rpm | SHA-256: e81d2cf2dbc87f88441e252936880263dfdd83803a6e865f19b148f7cc03f520 |
vdsm-python-zombiereaper-4.16.26-1.el6ev.noarch.rpm | SHA-256: 941c659c2205f5d59337f6f472839b903915ecea098de127e9e2d00d8592a6f8 |
vdsm-reg-4.16.26-1.el6ev.noarch.rpm | SHA-256: 215a0b2dc6af31016932eb3e8a2e812b89d139428da7a71d827c3f7e863d7f89 |
vdsm-xmlrpc-4.16.26-1.el6ev.noarch.rpm | SHA-256: 3255533236097d4b7efff27b3a7ee983f53b2c1bfa468f2650a17868c0810262 |
vdsm-yajsonrpc-4.16.26-1.el6ev.noarch.rpm | SHA-256: f02e5e142bdb555db503c62e5eae392b8711468a3e9af37738fcb6efcb4c3828 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.