- Issued:
- 2019-07-30
- Updated:
- 2019-07-30
RHBA-2019:1965 - Bug Fix Advisory
Synopsis
vdsm bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix one bug are now available for Red Hat Gluster Storage 3.4 on Red Hat Enterprise Linux 7.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
The vdsm package has been upgraded to version 4.30, which provides a number of bug fixes over the previous version. (BZ#1725703)
Users of vdsm package on Red Hat Gluster Storage are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1725703 - [RHEL-7.7 RHGS-34] yum update for RHEL-7.7 Snap-3 fails with for sos package conflict with live rhgs vdsm package
CVEs
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
ioprocess-1.1.2-1.el7ev.src.rpm | SHA-256: a50adc377b1b73a52c39756f7fe3794f75ebda173460612d5bdbc5688f4e192b |
safelease-1.0-7.el7ev.src.rpm | SHA-256: 9c908d8e25470ffdc3ada4eb3217e42d5645324716fadf6c62cce240c460c510 |
vdsm-4.30.18-1.0.el7rhgs.src.rpm | SHA-256: 19f8a950c63ad0c9055ae05b5e83a354f583fbdfb61d88e71ceb311147ca6dda |
x86_64 | |
ioprocess-1.1.2-1.el7ev.x86_64.rpm | SHA-256: f00d8bb1801e49aac24eb878b098c3df4ae5c03b0b2a73681cd1ae437bfebf58 |
ioprocess-debuginfo-1.1.2-1.el7ev.x86_64.rpm | SHA-256: 80f89d398c0aae3e6c648ac8c5bf99d1acbe981116728c1f3d9369cc74797c08 |
python2-ioprocess-1.1.2-1.el7ev.x86_64.rpm | SHA-256: 24003c45577d20df8ec5edc61060532e53d6d4fdf9dc57f504e11fe67ae891f9 |
safelease-1.0-7.el7ev.x86_64.rpm | SHA-256: 8c53b7a19fa954c6f124285b927696415b28b4dfaeeffe6a05cb793ce77b52ef |
safelease-debuginfo-1.0-7.el7ev.x86_64.rpm | SHA-256: d4d42de041855243ed3a3dbb4bd9756993ea7720402b8b630b9c4a6456a2610c |
vdsm-4.30.18-1.0.el7rhgs.x86_64.rpm | SHA-256: e499c2cad53f18ef4b0195b57cf2643efae30fa93ba711d00f025037a7cd1c0c |
vdsm-api-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 67491cb387a9bc1e927b6d83ded230ca5d7ac29738f2650b2dcae058491718e6 |
vdsm-client-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: c6f75cc3c056f3943b94a7ecfc925b232520542e337623d02ff6f2021a557eb2 |
vdsm-common-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 2f078ae5739ac1fdb179dc7d5b48c68dd3ccf30f8772d5701ee701530b549d9a |
vdsm-gluster-4.30.18-1.0.el7rhgs.x86_64.rpm | SHA-256: 5368ac9ce872e4f209febee3a4993b262c48d704976df5acbc981d8f7947e059 |
vdsm-hook-cpuflags-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: f508bd1bcdc20c856cd90734e60a02b44787fd367395862f4f71c5075313da56 |
vdsm-hook-ethtool-options-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 9385f4ee0032f12ea528a49c487a0110657ec7e8ad45ef4ccd2f777269b7c26a |
vdsm-hook-faqemu-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 31d31715b2917de210f10286ac35a1a3f4059787ece6ab6ed78ffa9ad34c597a |
vdsm-hook-fcoe-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 3780b3c51b390d0ce2209c06876cfe500925bf7c58b5c4e52e5ff22544b1e5fd |
vdsm-hook-localdisk-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: f176def37733c67d65a97ccbd290ead435a607b7db6ca7ccfca9723a415b2bb4 |
vdsm-hook-macspoof-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 0dc59766700d3a99b80dc06e669aeac56883b07c152ef38e739b081590d34d55 |
vdsm-hook-openstacknet-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: eb3de45ae87322dac1bb6495325c171858728cb5da452d297dfd5eb0e2b4d7ae |
vdsm-hook-qemucmdline-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: fec8b6459672d345fb414b1f91e3d95f5e615425c168723f1953614f893b841f |
vdsm-hook-vmfex-dev-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 9e0802674dc2467778e3bc2fd23592a8b282502f26e0fd2aeb4383f6d1587116 |
vdsm-http-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 5b810a2daf4b2e20b2a32283a8f4010d870e971044696346941361722352dc90 |
vdsm-jsonrpc-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 8719fb8884277c8245a02aaa6c44ce9b1d0c556eb57b092bd443d791ac73c284 |
vdsm-network-4.30.18-1.0.el7rhgs.x86_64.rpm | SHA-256: 7b61cce7f408fea5a50139d89e033cd5bb55960a598d3480fb6c2a259ba67213 |
vdsm-python-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 00fb7ae32f5c44973fd3dc5b87e0e61a4f45264fb5c88887c83900c02f0ef65a |
vdsm-tests-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 23c8a6f738abde0a54ba4d9d672408b7f8a9be4d33ab0f45a7b424390301bc64 |
vdsm-yajsonrpc-4.30.18-1.0.el7rhgs.noarch.rpm | SHA-256: 16f1f73d68ec702625903bdb923529f17f2fe72e4f8bf226bddb4800971cef1d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.