- Issued:
- 2017-01-10
- Updated:
- 2017-01-10
RHBA-2017:0044 - Bug Fix Advisory
Synopsis
vdsm 4.0.6 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, if a virtual machine shutdown was too slow, the state of the virtual machine could have been misreported as unresponsive, even though the virtual machine was operating correctly, albeit too slowly. This was caused by a too-aggressive checking on startup and shutdown. This patch takes into account slowdowns in startup and shutdown, avoiding false positive reports. (BZ#1391506)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1372798 - Setupnetworks not removing the "BRIDGE=" entry in ifcfg file when changing a untagged network to tagged
- BZ - 1391506 - [z-stream clone - 4.0.6] Periodic functions may continue running after VM is down.
- BZ - 1391877 - [z-stream clone - 4.0.6] After ovirt-engine is restarted, hypervisors stop listening on 54321 until vdsm is restarted.
- BZ - 1398415 - [z-stream clone - 4.0.6] Periodic functions/monitor start before VM is run.
- BZ - 1401540 - [z-stream clone - 4.0.6] HE VM shutdown abruptly when master storage domain is put into maintenance mode
- BZ - 1401583 - [z-stream clone - 4.0.6] Numa sampling causes very high load on the hypervisor.
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.18.21-1.el7ev.src.rpm | SHA-256: 72a0cde39d10e9f3eeaa0fde60c9b18e2af3a6b8b09394f4f71ad7f950003c68 |
x86_64 | |
vdsm-4.18.21-1.el7ev.x86_64.rpm | SHA-256: d9b4ac5318a6cd1382d92bbf44f737d3c8b00ac6dbfd5e1d2dd86fbeecf54b5d |
vdsm-api-4.18.21-1.el7ev.noarch.rpm | SHA-256: 2784db8d5363ade56b1d5ef7c0532f16f16df488de8d437dfcbc0babd1e8d0e1 |
vdsm-cli-4.18.21-1.el7ev.noarch.rpm | SHA-256: 9a7b9f9ae440920d758fa056832039a430708990c1572439b837799144f5b91d |
vdsm-gluster-4.18.21-1.el7ev.noarch.rpm | SHA-256: 7060c4ef8182cd5ca05488c0fcf3b31dc5e3715f6ec1d817a96a257551e19f50 |
vdsm-hook-ethtool-options-4.18.21-1.el7ev.noarch.rpm | SHA-256: 8b7619d8a80c0af4b310c469bbbad4a1244a5aee8dbfdd9fe02eddff50ecfc45 |
vdsm-hook-fcoe-4.18.21-1.el7ev.noarch.rpm | SHA-256: 1793fd465195bdb5316d36a08551750e96dc180de534bd33c5c482c19735422c |
vdsm-hook-macspoof-4.18.21-1.el7ev.noarch.rpm | SHA-256: 628f330324001892a173bb565f81ade856f2fffc95c0d96f8862b50c601b0eb9 |
vdsm-hook-openstacknet-4.18.21-1.el7ev.noarch.rpm | SHA-256: ba8df0b32d1d84e34ae625fcdece16b3d36b0006a05d049cb579a60734644233 |
vdsm-hook-vhostmd-4.18.21-1.el7ev.noarch.rpm | SHA-256: f724ec04bf06454a7f78a22aad1379a980420a66a4b701fb5f0c68ad663cba17 |
vdsm-hook-vmfex-dev-4.18.21-1.el7ev.noarch.rpm | SHA-256: e37d43c9dc23a3f3d6c5e7437c188390eba3c472e0881e4aef61902206fc5ed2 |
vdsm-infra-4.18.21-1.el7ev.noarch.rpm | SHA-256: ed3ee142fc78c6812fdf91e921b86825e2db483f1142d79d838fc70c73378195 |
vdsm-jsonrpc-4.18.21-1.el7ev.noarch.rpm | SHA-256: 3d7e31795b58f1974e46ca1f7ed30e6d436286553227d849cc0bd8ea076321f8 |
vdsm-python-4.18.21-1.el7ev.noarch.rpm | SHA-256: f50d679aa9d07b5908b6c396c119e5708f499b6b7ab0a496d1fffa61b64db04d |
vdsm-xmlrpc-4.18.21-1.el7ev.noarch.rpm | SHA-256: 37c7531ad21ebde6c3138884994df9c4457330791b33e3852d5bc431fd3f0be7 |
vdsm-yajsonrpc-4.18.21-1.el7ev.noarch.rpm | SHA-256: 6005e1c71747ebf660fcebd214acfa4d6cedb5b93274cdefa62ed218ab60e31c |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.18.21-1.el7ev.src.rpm | SHA-256: 72a0cde39d10e9f3eeaa0fde60c9b18e2af3a6b8b09394f4f71ad7f950003c68 |
ppc64le | |
vdsm-4.18.21-1.el7ev.ppc64le.rpm | SHA-256: bb081afaeb9600c58769aaf7644137d705fadf0123eb146c42dea8f689de73ac |
vdsm-api-4.18.21-1.el7ev.noarch.rpm | SHA-256: 2784db8d5363ade56b1d5ef7c0532f16f16df488de8d437dfcbc0babd1e8d0e1 |
vdsm-cli-4.18.21-1.el7ev.noarch.rpm | SHA-256: 9a7b9f9ae440920d758fa056832039a430708990c1572439b837799144f5b91d |
vdsm-hook-ethtool-options-4.18.21-1.el7ev.noarch.rpm | SHA-256: 8b7619d8a80c0af4b310c469bbbad4a1244a5aee8dbfdd9fe02eddff50ecfc45 |
vdsm-hook-fcoe-4.18.21-1.el7ev.noarch.rpm | SHA-256: 1793fd465195bdb5316d36a08551750e96dc180de534bd33c5c482c19735422c |
vdsm-hook-macspoof-4.18.21-1.el7ev.noarch.rpm | SHA-256: 628f330324001892a173bb565f81ade856f2fffc95c0d96f8862b50c601b0eb9 |
vdsm-hook-openstacknet-4.18.21-1.el7ev.noarch.rpm | SHA-256: ba8df0b32d1d84e34ae625fcdece16b3d36b0006a05d049cb579a60734644233 |
vdsm-hook-vhostmd-4.18.21-1.el7ev.noarch.rpm | SHA-256: f724ec04bf06454a7f78a22aad1379a980420a66a4b701fb5f0c68ad663cba17 |
vdsm-hook-vmfex-dev-4.18.21-1.el7ev.noarch.rpm | SHA-256: e37d43c9dc23a3f3d6c5e7437c188390eba3c472e0881e4aef61902206fc5ed2 |
vdsm-infra-4.18.21-1.el7ev.noarch.rpm | SHA-256: ed3ee142fc78c6812fdf91e921b86825e2db483f1142d79d838fc70c73378195 |
vdsm-jsonrpc-4.18.21-1.el7ev.noarch.rpm | SHA-256: 3d7e31795b58f1974e46ca1f7ed30e6d436286553227d849cc0bd8ea076321f8 |
vdsm-python-4.18.21-1.el7ev.noarch.rpm | SHA-256: f50d679aa9d07b5908b6c396c119e5708f499b6b7ab0a496d1fffa61b64db04d |
vdsm-xmlrpc-4.18.21-1.el7ev.noarch.rpm | SHA-256: 37c7531ad21ebde6c3138884994df9c4457330791b33e3852d5bc431fd3f0be7 |
vdsm-yajsonrpc-4.18.21-1.el7ev.noarch.rpm | SHA-256: 6005e1c71747ebf660fcebd214acfa4d6cedb5b93274cdefa62ed218ab60e31c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.