- Issued:
- 2019-05-08
- Updated:
- 2019-05-08
RHBA-2019:1077 - Bug Fix Advisory
Synopsis
vdsm bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated VDSM packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts or Red Hat Enterprise Linux hosts.
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.3/html-single/technical_notes
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1111783 - [RFE][TestOnly] Provide SCSI reservation support for virtio-scsi via rhev-guest-tools for win-8 and win-2012 guests using Direct-Lun as disks
- BZ - 1111784 - [RFE] Provide SCSI reservation support for virtio-scsi via rhev-guest-tools for win-8 and win-2012 guests using Shared disks [blocked on platform bug 1452210 ]
- BZ - 1499056 - Unreachable ISO/Export SD prevents hosts from activating
- BZ - 1502083 - Live storage migration completes but leaves volume un-opened.
- BZ - 1510336 - [RFE] - Automatically instruct MTU to the guest
- BZ - 1510856 - [RFE] Time sync in VM after resuming from PAUSE state
- BZ - 1511891 - qemu-img: slow disk move/clone/import
- BZ - 1514004 - [downstream clone - 4.3.0] [RFE] Drop TLSv1 and TLSv1.1 encryption protocols support
- BZ - 1537148 - Guests not responding periodically in Manager
- BZ - 1547679 - "OSError: [Errno 24] Too many open files" after ISO domain is non-responsive for 27 hours
- BZ - 1560460 - getFileStats fails on NFS domain in case or recursive symbolic link (e.g., using NetApp snapshots)
- BZ - 1575777 - RHV import fails if VM has an unreachable floppy defined
- BZ - 1578057 - Security sweep is showing weak ciphers RC4 and 3DES are enabled on VDSM port 54321.
- BZ - 1585008 - Add option to configure cipher list available for encrypted connections
- BZ - 1589612 - Cannot start VM with QoS IOPS after host&engine upgrade from 4.1 to 4.2
- BZ - 1590063 - VM was destroyed on destination after successful migration due to missing the 'device' key on the lease device
- BZ - 1593568 - Unexpected behaviour of HA VM when host VM was running ended up Non-responsive.
- BZ - 1602047 - vdsm-tool upgrade-networks fails with KeyError: 'defaultRoute'
- BZ - 1607952 - Kdump Status is disabled after successful fencing of host.
- BZ - 1612978 - Extending VM disk fails with message "disk was successfully updated to 0 GB"
- BZ - 1614430 - vdsm-gluster stuck on operations forcing vdsm to stop working
- BZ - 1617745 - startUnderlyingVm fails with exception resulting in split-brain
- BZ - 1625591 - After importing KVM VM, removing the VM and re-importing, the re-importing fails
- BZ - 1628150 - Snapshot deletion fails with "MaxNumOfVmSockets has no value for version"
- BZ - 1631624 - Exception on unsetPortMirroring makes vmDestroy fail.
- BZ - 1634765 - Guest agent info is not reported with latest vdsm
- BZ - 1636254 - disable lldp in vdsm to avoid FCoE storage not initiated on boot
- BZ - 1645620 - vdsm-client has missing dependecy to PyYAML
- BZ - 1647607 - RHV host passthrough of USB3 disk device stops VM from booting.
- BZ - 1654417 - vdsm fails with Invalid index metadata (invalid magic: 0) when trying to add a VM lease
- BZ - 1655115 - Drop 3.6 and 4.0 datacenter/cluster level
- BZ - 1658866 - [scale] adding storage domain creates significant load
- BZ - 1662449 - Bad error handling when running lvm commands in vdsm
- BZ - 1666795 - VMs migrated to 4.3 are missing the appropriate virt XML for dynamic ownership, and are reset to root:root, preventing them from starting
- BZ - 1680450 - VDSM does not handle device removal from within the Guest
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.30.13-1.el7ev.src.rpm | SHA-256: 26ac4aa2d7b8a171a78eebea48b1c61ae75d828ff7bf7d916cb14ed6a500f38e |
x86_64 | |
vdsm-4.30.13-1.el7ev.x86_64.rpm | SHA-256: 90dfbfd01e06ad9789dc5a28b5ebfb118fcf090a073f074bac4dd7cea3fafac1 |
vdsm-api-4.30.13-1.el7ev.noarch.rpm | SHA-256: bb527c74c8fc8236935410087b9b73c8ed54a21c446d846b32f5a05af5caf5a4 |
vdsm-client-4.30.13-1.el7ev.noarch.rpm | SHA-256: 1ab4dc09bff1ce877c75bd9f24afdb4fd43795ea0bb187f20b7d021faf5fcc17 |
vdsm-common-4.30.13-1.el7ev.noarch.rpm | SHA-256: 0403052f2945db0da3c358084132105ff92ed15e77340b796be2556ed7604359 |
vdsm-gluster-4.30.13-1.el7ev.x86_64.rpm | SHA-256: 8685740d9ccd432a5208ed819bc630e49a90155ad513efd111db98ad1e6a7214 |
vdsm-hook-checkips-4.30.13-1.el7ev.x86_64.rpm | SHA-256: c9daec2dd5e351dd03cefc5a5d214a260a39bfac6e754addc2219c21d2667af5 |
vdsm-hook-cpuflags-4.30.13-1.el7ev.noarch.rpm | SHA-256: 078a8be25c2706d29245d43c902b90970a66e8b81ecfce6adc5509629b15bf7a |
vdsm-hook-ethtool-options-4.30.13-1.el7ev.noarch.rpm | SHA-256: 4a818d91775fab632b1223395b177289b0ac8bfb0dfde7dfc7916bce6c49e59e |
vdsm-hook-extra-ipv4-addrs-4.30.13-1.el7ev.x86_64.rpm | SHA-256: f34cfee2f46ccb28b94c2761fc944f964c59ef8eaabcb45861bbe41526d9aa48 |
vdsm-hook-fcoe-4.30.13-1.el7ev.noarch.rpm | SHA-256: 44c7d6897ea659512b000029541afa7c1abdd4ded8c4847151932e8724d1d319 |
vdsm-hook-localdisk-4.30.13-1.el7ev.noarch.rpm | SHA-256: ded4a14c075b5075d2ab190e0556e23ea02c93aed8f568db95ebf738012b15af |
vdsm-hook-macspoof-4.30.13-1.el7ev.noarch.rpm | SHA-256: b4c49a1301eb70b7a1c2024df8819796ba790e3285ceb30129fc18cf91d1bc0f |
vdsm-hook-nestedvt-4.30.13-1.el7ev.noarch.rpm | SHA-256: a31a0ed450dfae6eaf35e5b97038a58c6854ddd87b317b2ee59f8fc157bacdd9 |
vdsm-hook-openstacknet-4.30.13-1.el7ev.noarch.rpm | SHA-256: 9159133c562a25520eb815c28513909347d14cb0f1d8420fe2036dc73bf523c8 |
vdsm-hook-vhostmd-4.30.13-1.el7ev.noarch.rpm | SHA-256: 39539e30fff7fb93a15b54631604908c6a5adcb258d0a7906a167a189ccbe15b |
vdsm-hook-vmfex-dev-4.30.13-1.el7ev.noarch.rpm | SHA-256: 8a1b178fabbc2b44867a43c4e34e488ab484ee7ad607712266e0692ad89d5da3 |
vdsm-http-4.30.13-1.el7ev.noarch.rpm | SHA-256: 43895f373dc625a0eb436bd0d638510a033b4d339dd22ecdfc7a884dbe8def96 |
vdsm-jsonrpc-4.30.13-1.el7ev.noarch.rpm | SHA-256: 3aa94b685e8c0165cd5e057be3b7304bd9b7ac2fbe48c0a1e1d8d7c5b50d7f8e |
vdsm-network-4.30.13-1.el7ev.x86_64.rpm | SHA-256: b79f6ccc84f9993c107dc7a2746cad2bde308e075a6a5b77c57fb8024945aac5 |
vdsm-python-4.30.13-1.el7ev.noarch.rpm | SHA-256: 5bcfe5ca7091c28529f97d83afb26c5a47de1f587f0700bf8728acf68817b3f3 |
vdsm-yajsonrpc-4.30.13-1.el7ev.noarch.rpm | SHA-256: 198c95164990e6012fe87a6ef1eaa50dbb41b56607353e2aab97c983f0f2ad3d |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.30.13-1.el7ev.src.rpm | SHA-256: 26ac4aa2d7b8a171a78eebea48b1c61ae75d828ff7bf7d916cb14ed6a500f38e |
ppc64le | |
vdsm-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: 91f6d92d65f8b7cea8c1a515bafc547c360482a69e45713b075977630c35b618 |
vdsm-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: 91f6d92d65f8b7cea8c1a515bafc547c360482a69e45713b075977630c35b618 |
vdsm-api-4.30.13-1.el7ev.noarch.rpm | SHA-256: bb527c74c8fc8236935410087b9b73c8ed54a21c446d846b32f5a05af5caf5a4 |
vdsm-api-4.30.13-1.el7ev.noarch.rpm | SHA-256: bb527c74c8fc8236935410087b9b73c8ed54a21c446d846b32f5a05af5caf5a4 |
vdsm-client-4.30.13-1.el7ev.noarch.rpm | SHA-256: 1ab4dc09bff1ce877c75bd9f24afdb4fd43795ea0bb187f20b7d021faf5fcc17 |
vdsm-client-4.30.13-1.el7ev.noarch.rpm | SHA-256: 1ab4dc09bff1ce877c75bd9f24afdb4fd43795ea0bb187f20b7d021faf5fcc17 |
vdsm-common-4.30.13-1.el7ev.noarch.rpm | SHA-256: 0403052f2945db0da3c358084132105ff92ed15e77340b796be2556ed7604359 |
vdsm-common-4.30.13-1.el7ev.noarch.rpm | SHA-256: 0403052f2945db0da3c358084132105ff92ed15e77340b796be2556ed7604359 |
vdsm-gluster-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: 0f9168d28dfe81bde8837e9e03dd0356804bc1ac863c4d3f03bcc54e8032c0d6 |
vdsm-gluster-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: 0f9168d28dfe81bde8837e9e03dd0356804bc1ac863c4d3f03bcc54e8032c0d6 |
vdsm-hook-checkips-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: db745a4e681e1b35af53bd907ecb11c0144739444f1f86a7106e3d13088b5186 |
vdsm-hook-checkips-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: db745a4e681e1b35af53bd907ecb11c0144739444f1f86a7106e3d13088b5186 |
vdsm-hook-cpuflags-4.30.13-1.el7ev.noarch.rpm | SHA-256: 078a8be25c2706d29245d43c902b90970a66e8b81ecfce6adc5509629b15bf7a |
vdsm-hook-cpuflags-4.30.13-1.el7ev.noarch.rpm | SHA-256: 078a8be25c2706d29245d43c902b90970a66e8b81ecfce6adc5509629b15bf7a |
vdsm-hook-ethtool-options-4.30.13-1.el7ev.noarch.rpm | SHA-256: 4a818d91775fab632b1223395b177289b0ac8bfb0dfde7dfc7916bce6c49e59e |
vdsm-hook-ethtool-options-4.30.13-1.el7ev.noarch.rpm | SHA-256: 4a818d91775fab632b1223395b177289b0ac8bfb0dfde7dfc7916bce6c49e59e |
vdsm-hook-extra-ipv4-addrs-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: 330aee238a41441099fc7287869015af16bd99c26db33dfaa67d53eadb6af20c |
vdsm-hook-extra-ipv4-addrs-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: 330aee238a41441099fc7287869015af16bd99c26db33dfaa67d53eadb6af20c |
vdsm-hook-fcoe-4.30.13-1.el7ev.noarch.rpm | SHA-256: 44c7d6897ea659512b000029541afa7c1abdd4ded8c4847151932e8724d1d319 |
vdsm-hook-fcoe-4.30.13-1.el7ev.noarch.rpm | SHA-256: 44c7d6897ea659512b000029541afa7c1abdd4ded8c4847151932e8724d1d319 |
vdsm-hook-localdisk-4.30.13-1.el7ev.noarch.rpm | SHA-256: ded4a14c075b5075d2ab190e0556e23ea02c93aed8f568db95ebf738012b15af |
vdsm-hook-localdisk-4.30.13-1.el7ev.noarch.rpm | SHA-256: ded4a14c075b5075d2ab190e0556e23ea02c93aed8f568db95ebf738012b15af |
vdsm-hook-macspoof-4.30.13-1.el7ev.noarch.rpm | SHA-256: b4c49a1301eb70b7a1c2024df8819796ba790e3285ceb30129fc18cf91d1bc0f |
vdsm-hook-macspoof-4.30.13-1.el7ev.noarch.rpm | SHA-256: b4c49a1301eb70b7a1c2024df8819796ba790e3285ceb30129fc18cf91d1bc0f |
vdsm-hook-nestedvt-4.30.13-1.el7ev.noarch.rpm | SHA-256: a31a0ed450dfae6eaf35e5b97038a58c6854ddd87b317b2ee59f8fc157bacdd9 |
vdsm-hook-nestedvt-4.30.13-1.el7ev.noarch.rpm | SHA-256: a31a0ed450dfae6eaf35e5b97038a58c6854ddd87b317b2ee59f8fc157bacdd9 |
vdsm-hook-openstacknet-4.30.13-1.el7ev.noarch.rpm | SHA-256: 9159133c562a25520eb815c28513909347d14cb0f1d8420fe2036dc73bf523c8 |
vdsm-hook-openstacknet-4.30.13-1.el7ev.noarch.rpm | SHA-256: 9159133c562a25520eb815c28513909347d14cb0f1d8420fe2036dc73bf523c8 |
vdsm-hook-vhostmd-4.30.13-1.el7ev.noarch.rpm | SHA-256: 39539e30fff7fb93a15b54631604908c6a5adcb258d0a7906a167a189ccbe15b |
vdsm-hook-vhostmd-4.30.13-1.el7ev.noarch.rpm | SHA-256: 39539e30fff7fb93a15b54631604908c6a5adcb258d0a7906a167a189ccbe15b |
vdsm-hook-vmfex-dev-4.30.13-1.el7ev.noarch.rpm | SHA-256: 8a1b178fabbc2b44867a43c4e34e488ab484ee7ad607712266e0692ad89d5da3 |
vdsm-hook-vmfex-dev-4.30.13-1.el7ev.noarch.rpm | SHA-256: 8a1b178fabbc2b44867a43c4e34e488ab484ee7ad607712266e0692ad89d5da3 |
vdsm-http-4.30.13-1.el7ev.noarch.rpm | SHA-256: 43895f373dc625a0eb436bd0d638510a033b4d339dd22ecdfc7a884dbe8def96 |
vdsm-http-4.30.13-1.el7ev.noarch.rpm | SHA-256: 43895f373dc625a0eb436bd0d638510a033b4d339dd22ecdfc7a884dbe8def96 |
vdsm-jsonrpc-4.30.13-1.el7ev.noarch.rpm | SHA-256: 3aa94b685e8c0165cd5e057be3b7304bd9b7ac2fbe48c0a1e1d8d7c5b50d7f8e |
vdsm-jsonrpc-4.30.13-1.el7ev.noarch.rpm | SHA-256: 3aa94b685e8c0165cd5e057be3b7304bd9b7ac2fbe48c0a1e1d8d7c5b50d7f8e |
vdsm-network-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: b6269798e78a2bf2f7d0d99aa03383e7b6838a437a7adb4dfd7fe9971f8c3edb |
vdsm-network-4.30.13-1.el7ev.ppc64le.rpm | SHA-256: b6269798e78a2bf2f7d0d99aa03383e7b6838a437a7adb4dfd7fe9971f8c3edb |
vdsm-python-4.30.13-1.el7ev.noarch.rpm | SHA-256: 5bcfe5ca7091c28529f97d83afb26c5a47de1f587f0700bf8728acf68817b3f3 |
vdsm-python-4.30.13-1.el7ev.noarch.rpm | SHA-256: 5bcfe5ca7091c28529f97d83afb26c5a47de1f587f0700bf8728acf68817b3f3 |
vdsm-yajsonrpc-4.30.13-1.el7ev.noarch.rpm | SHA-256: 198c95164990e6012fe87a6ef1eaa50dbb41b56607353e2aab97c983f0f2ad3d |
vdsm-yajsonrpc-4.30.13-1.el7ev.noarch.rpm | SHA-256: 198c95164990e6012fe87a6ef1eaa50dbb41b56607353e2aab97c983f0f2ad3d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.