- Issued:
- 2019-04-10
- Updated:
- 2019-04-10
RHBA-2019:0738 - Bug Fix Advisory
Synopsis
Red Hat OpenStack Platform 10 openvswitch Bug Fix Advisory
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated packages that resolve various issues are now available for Red Hat
OpenStack Platform 10.0 (Newton) for RHEL 7.
Description
Red Hat OpenStack Platform provides the facilities for building, deploying
and monitoring a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware.
Changes to the openvswitch component:
- Prior to OVS 2.9, rxq to pmd assignment was done with a round-robin scheme according to the port/queue number. OVS 2.9 also includes the recorded processing cycles from rxqs when assigning to pmds.
However, you can also use the `pmd-rxq-assign=roundrobin` configuration and continue to use the legacy round-robin scheme. The round-robin scheme might be preferable in systems with volatile traffic and configuration. (BZ#1628669)
- Previously, the python-openvswitch library did not de-allocate objects used when communicating with the openvswitch process, causing a memory leak in neutron agents. As a result, Neutron agent memory size increased continuously until reaching a state of memory starvation and the kernel out-of-memory-killer started terminating processes.
With this update, the python-openvswitch library correctly de-allocates objects and the memory leak in neutron no longer occurs. (BZ#1693430)
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat OpenStack Platform 10 runs on Red Hat Enterprise Linux 7.6.
The Red Hat OpenStack Platform 10 Release Notes contain the following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat OpenStack Platform 10, including which
channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en/red-hat-openstack-platform/10/paged/release-notes
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack 10 x86_64
Fixes
- BZ - 1693430 - memory leak in openvswitch python wrapper for RHOSP10
CVEs
(none)
References
(none)
Red Hat OpenStack 10
| SRPM | |
|---|---|
| openvswitch-2.9.0-97.el7fdp.src.rpm | SHA-256: 3977387527881341ee185860a7acd50c94ea78b8a0563db8579f86c8aafb7d2f |
| x86_64 | |
| openvswitch-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: 831e8c8f4921a850ac1a014d81d60595de0705978a8038df72d44e4e6e36a938 |
| openvswitch-debuginfo-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: 8dfad96da4c7587f26af3f68c09e741d18acff5d426d9d5476d89ccf54dbd1a9 |
| openvswitch-devel-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: 4d3a634ebf48eec91891572bed427c58b791210143ed820c4cf051132020bc13 |
| openvswitch-ovn-central-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: 3e19c84918340c7a1b94def6a811b1608490cb3e13ce8da430a82349226f026f |
| openvswitch-ovn-common-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: 5c26c49ca491117ace039e1dfc9c4b7b4f370664c513175e89cb4266b0494a13 |
| openvswitch-ovn-host-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: d32594ab78a5522ec285d8830d659eeffdea84fe5670f9e7c423664062298e1d |
| openvswitch-ovn-vtep-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: 0eb9a971663ccf41873dfaf00fe845098f549a1b55bd3514b812eb690d14c090 |
| openvswitch-test-2.9.0-97.el7fdp.noarch.rpm | SHA-256: 36da8ee181ee42e6fab6769b246f250ba2ef45ff22c67169a10a3e90c61db892 |
| python-openvswitch-2.9.0-97.el7fdp.x86_64.rpm | SHA-256: 6cc1a4e1928d14321528ef73fc1233005a63f2a78fa5377b706175b5e63de647 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.