- Issued:
 - 2019-08-12
 - Updated:
 - 2019-08-12
 
RHBA-2019:2432 - Bug Fix Advisory
Synopsis
vdsm bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated VDSM packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts or Red Hat Enterprise Linux hosts.
Changes to the ovirt-engine component:
- Previously, when lease data was moved from the VM Static to the VM Dynamic DB table, there was no consideration that upgrading from 4.1 to later versions would leave the lease data empty when a lease storage domain ID had been specified. This caused validation to fail when the VM launched, so that the VM no longer ran without the user resetting the lease storage domain ID. Consequently, HA VMs with lease storage domain IDs failed to execute.
 
This bug is now fixed, such that validation no longer takes place when the VM runs, and the lease data is automatically regenerated when the lease storage domain ID is set. After the lease data is regenerated, the VM has the information it needs to run.
Now, after upgrading from 4.1 to later versions, HA VMs with lease storage domain IDs execute normally. (BZ#1716951)
Changes to the vdsm component:
- In RHVM 4.1 and earlier, DiskType is an int value, while from RHVM 4.2 and later, DiskType is a string value. Consequently, using RHV 4.3 hosts with RHVM 4.1 causes the VDSM error "Invalid parameter: 'DiskType=2'"
 
In this release, DiskType is once more an int value, so RHV 4.3 hosts can now work with RHVM 4.1. (BZ#1723873)
- TBA (BZ#1703132)
 
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
 - Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
 
Fixes
- BZ - 1703132 - Prevent ABRT on RHVH nodes "phoning home" (contacting redhat.com) either in all cases or only by explicit approval, never do so by default.
 - BZ - 1714509 - Conflicting files for vdsm and sos
 - BZ - 1716951 - [downstream clone - 4.3.5] Highly Available (HA) VMs with a VM lease failed to start after a 4.1 to 4.2 upgrade.
 - BZ - 1719125 - [downstream clone - 4.3.5] lshw can take more than 15 seconds to execute depending on the system
 - BZ - 1723873 - [downstream clone - 4.3.5] ovirt-engine-4.1.11.2 fails to add disks with vdsm-4.30 hosts and 4.1 compatibility level: InvalidParameterException: Invalid parameter: 'DiskType=2'
 
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
| SRPM | |
|---|---|
| vdsm-4.30.24-2.el7ev.src.rpm | SHA-256: 0127ac734d52fdee60a05630bf9abbe765b672b6a5a073219be16e5b9c31f107 | 
| x86_64 | |
| vdsm-4.30.24-2.el7ev.x86_64.rpm | SHA-256: c122af0705a0ce64778af033e355799956cc13538996c0cc8c3cbb521cf7a3ac | 
| vdsm-api-4.30.24-2.el7ev.noarch.rpm | SHA-256: 1b4e602e894fd54d572f34c0d59f9d48062e54dca0fa5872f592cea2d6b67f25 | 
| vdsm-client-4.30.24-2.el7ev.noarch.rpm | SHA-256: 25310c86dfd164e84bc257b8969ff1a3d2db2cf03807145381950bfc348db27f | 
| vdsm-common-4.30.24-2.el7ev.noarch.rpm | SHA-256: acaefb2c7e22451b455098288728269430dbd5902c7a27505497c27c8f3c90a8 | 
| vdsm-gluster-4.30.24-2.el7ev.x86_64.rpm | SHA-256: 5a0558822ff526ccb271b788a9a6ba65ccf0aa06978bbb47b33436eeaec1be13 | 
| vdsm-hook-checkips-4.30.24-2.el7ev.x86_64.rpm | SHA-256: 2b40c3d8bf366cf2e12efdaa0e3fa108347fabcf9f7ead6420b83a903f365a69 | 
| vdsm-hook-cpuflags-4.30.24-2.el7ev.noarch.rpm | SHA-256: 4e02565a89072bdc26ac091becb5e5848767e0579b9741746487a50b22cf92c7 | 
| vdsm-hook-ethtool-options-4.30.24-2.el7ev.noarch.rpm | SHA-256: b8bf0d56a4ec98591606842764e3e4493eeceb29db979d90c188029a170cfc17 | 
| vdsm-hook-extra-ipv4-addrs-4.30.24-2.el7ev.x86_64.rpm | SHA-256: eecabd070a3d43466af12a5fddefc66f9ce66bc32b9bd9e6887d2cf0b986a577 | 
| vdsm-hook-fcoe-4.30.24-2.el7ev.noarch.rpm | SHA-256: 12cabf66b8f2ae377f4d057207fe421cebb7996f5006898c9359de7c87734118 | 
| vdsm-hook-localdisk-4.30.24-2.el7ev.noarch.rpm | SHA-256: 7ea35ef753104fa14a61bbe4282dbb079c4a8259d3520a04be71449423411ae5 | 
| vdsm-hook-macspoof-4.30.24-2.el7ev.noarch.rpm | SHA-256: bdab5cdd92cedecb281007087e4614434522f04110ffd27300754c68261dec95 | 
| vdsm-hook-nestedvt-4.30.24-2.el7ev.noarch.rpm | SHA-256: b1cc0b500ce667454748c4d665823c5892a506a90a7a3293c92094e12fa715bb | 
| vdsm-hook-openstacknet-4.30.24-2.el7ev.noarch.rpm | SHA-256: 9cdc98af9cc3fdd0dada286453a28e3a09db3af23209ba41922b979ab710b1f2 | 
| vdsm-hook-vhostmd-4.30.24-2.el7ev.noarch.rpm | SHA-256: 021380e32ee78bdaab04bb109d0fd936fcf79b5ffb74edd7b1234ba0bf6e1be8 | 
| vdsm-hook-vmfex-dev-4.30.24-2.el7ev.noarch.rpm | SHA-256: 505d55f1fa83781c1083022ba41b44b415fed0498fc8da3159f4cb50eefdf0f3 | 
| vdsm-http-4.30.24-2.el7ev.noarch.rpm | SHA-256: 8ba34ba7f19fae14b60c7dc65aced31d0eca8f01620fd2fe6b7332a3daec914c | 
| vdsm-jsonrpc-4.30.24-2.el7ev.noarch.rpm | SHA-256: be48e2c5a96a76d202f03fd89f51ecfc2c90729c0b7a3519ba93c1a0c24fafda | 
| vdsm-network-4.30.24-2.el7ev.x86_64.rpm | SHA-256: f3853838aa36d06ebe7257e029aa718b51306cbdfec3f1e8da43112a8a87b3a6 | 
| vdsm-python-4.30.24-2.el7ev.noarch.rpm | SHA-256: 5a4b749df77e7cbb2a1c4e291e10128d491917e42d99908e75295ea82611a397 | 
| vdsm-yajsonrpc-4.30.24-2.el7ev.noarch.rpm | SHA-256: d5b3c33cc279da814c431037f9f32d25e4c189594af9e4d8b0279e577ba663cd | 
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
| SRPM | |
|---|---|
| vdsm-4.30.24-2.el7ev.src.rpm | SHA-256: 0127ac734d52fdee60a05630bf9abbe765b672b6a5a073219be16e5b9c31f107 | 
| ppc64le | |
| vdsm-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: f2350693a88ac9d1dcc114485a3629e24383935586cf088da32ba52e93355817 | 
| vdsm-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: f2350693a88ac9d1dcc114485a3629e24383935586cf088da32ba52e93355817 | 
| vdsm-api-4.30.24-2.el7ev.noarch.rpm | SHA-256: 1b4e602e894fd54d572f34c0d59f9d48062e54dca0fa5872f592cea2d6b67f25 | 
| vdsm-api-4.30.24-2.el7ev.noarch.rpm | SHA-256: 1b4e602e894fd54d572f34c0d59f9d48062e54dca0fa5872f592cea2d6b67f25 | 
| vdsm-client-4.30.24-2.el7ev.noarch.rpm | SHA-256: 25310c86dfd164e84bc257b8969ff1a3d2db2cf03807145381950bfc348db27f | 
| vdsm-client-4.30.24-2.el7ev.noarch.rpm | SHA-256: 25310c86dfd164e84bc257b8969ff1a3d2db2cf03807145381950bfc348db27f | 
| vdsm-common-4.30.24-2.el7ev.noarch.rpm | SHA-256: acaefb2c7e22451b455098288728269430dbd5902c7a27505497c27c8f3c90a8 | 
| vdsm-common-4.30.24-2.el7ev.noarch.rpm | SHA-256: acaefb2c7e22451b455098288728269430dbd5902c7a27505497c27c8f3c90a8 | 
| vdsm-gluster-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: b28eb5a32ab7c026b821e151262c224c1611edc59f661dd64b46cea71739aefb | 
| vdsm-gluster-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: b28eb5a32ab7c026b821e151262c224c1611edc59f661dd64b46cea71739aefb | 
| vdsm-hook-checkips-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: 6a0078166810b27ace6d6d4ffbb7c6548ff615550918848e08fff7678f01fd48 | 
| vdsm-hook-checkips-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: 6a0078166810b27ace6d6d4ffbb7c6548ff615550918848e08fff7678f01fd48 | 
| vdsm-hook-cpuflags-4.30.24-2.el7ev.noarch.rpm | SHA-256: 4e02565a89072bdc26ac091becb5e5848767e0579b9741746487a50b22cf92c7 | 
| vdsm-hook-cpuflags-4.30.24-2.el7ev.noarch.rpm | SHA-256: 4e02565a89072bdc26ac091becb5e5848767e0579b9741746487a50b22cf92c7 | 
| vdsm-hook-ethtool-options-4.30.24-2.el7ev.noarch.rpm | SHA-256: b8bf0d56a4ec98591606842764e3e4493eeceb29db979d90c188029a170cfc17 | 
| vdsm-hook-ethtool-options-4.30.24-2.el7ev.noarch.rpm | SHA-256: b8bf0d56a4ec98591606842764e3e4493eeceb29db979d90c188029a170cfc17 | 
| vdsm-hook-extra-ipv4-addrs-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: 5084d73ea884bad49f0c9d486662950f8e1a82f413ab8718b68b9efe40157e49 | 
| vdsm-hook-extra-ipv4-addrs-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: 5084d73ea884bad49f0c9d486662950f8e1a82f413ab8718b68b9efe40157e49 | 
| vdsm-hook-fcoe-4.30.24-2.el7ev.noarch.rpm | SHA-256: 12cabf66b8f2ae377f4d057207fe421cebb7996f5006898c9359de7c87734118 | 
| vdsm-hook-fcoe-4.30.24-2.el7ev.noarch.rpm | SHA-256: 12cabf66b8f2ae377f4d057207fe421cebb7996f5006898c9359de7c87734118 | 
| vdsm-hook-localdisk-4.30.24-2.el7ev.noarch.rpm | SHA-256: 7ea35ef753104fa14a61bbe4282dbb079c4a8259d3520a04be71449423411ae5 | 
| vdsm-hook-localdisk-4.30.24-2.el7ev.noarch.rpm | SHA-256: 7ea35ef753104fa14a61bbe4282dbb079c4a8259d3520a04be71449423411ae5 | 
| vdsm-hook-macspoof-4.30.24-2.el7ev.noarch.rpm | SHA-256: bdab5cdd92cedecb281007087e4614434522f04110ffd27300754c68261dec95 | 
| vdsm-hook-macspoof-4.30.24-2.el7ev.noarch.rpm | SHA-256: bdab5cdd92cedecb281007087e4614434522f04110ffd27300754c68261dec95 | 
| vdsm-hook-nestedvt-4.30.24-2.el7ev.noarch.rpm | SHA-256: b1cc0b500ce667454748c4d665823c5892a506a90a7a3293c92094e12fa715bb | 
| vdsm-hook-nestedvt-4.30.24-2.el7ev.noarch.rpm | SHA-256: b1cc0b500ce667454748c4d665823c5892a506a90a7a3293c92094e12fa715bb | 
| vdsm-hook-openstacknet-4.30.24-2.el7ev.noarch.rpm | SHA-256: 9cdc98af9cc3fdd0dada286453a28e3a09db3af23209ba41922b979ab710b1f2 | 
| vdsm-hook-openstacknet-4.30.24-2.el7ev.noarch.rpm | SHA-256: 9cdc98af9cc3fdd0dada286453a28e3a09db3af23209ba41922b979ab710b1f2 | 
| vdsm-hook-vhostmd-4.30.24-2.el7ev.noarch.rpm | SHA-256: 021380e32ee78bdaab04bb109d0fd936fcf79b5ffb74edd7b1234ba0bf6e1be8 | 
| vdsm-hook-vhostmd-4.30.24-2.el7ev.noarch.rpm | SHA-256: 021380e32ee78bdaab04bb109d0fd936fcf79b5ffb74edd7b1234ba0bf6e1be8 | 
| vdsm-hook-vmfex-dev-4.30.24-2.el7ev.noarch.rpm | SHA-256: 505d55f1fa83781c1083022ba41b44b415fed0498fc8da3159f4cb50eefdf0f3 | 
| vdsm-hook-vmfex-dev-4.30.24-2.el7ev.noarch.rpm | SHA-256: 505d55f1fa83781c1083022ba41b44b415fed0498fc8da3159f4cb50eefdf0f3 | 
| vdsm-http-4.30.24-2.el7ev.noarch.rpm | SHA-256: 8ba34ba7f19fae14b60c7dc65aced31d0eca8f01620fd2fe6b7332a3daec914c | 
| vdsm-http-4.30.24-2.el7ev.noarch.rpm | SHA-256: 8ba34ba7f19fae14b60c7dc65aced31d0eca8f01620fd2fe6b7332a3daec914c | 
| vdsm-jsonrpc-4.30.24-2.el7ev.noarch.rpm | SHA-256: be48e2c5a96a76d202f03fd89f51ecfc2c90729c0b7a3519ba93c1a0c24fafda | 
| vdsm-jsonrpc-4.30.24-2.el7ev.noarch.rpm | SHA-256: be48e2c5a96a76d202f03fd89f51ecfc2c90729c0b7a3519ba93c1a0c24fafda | 
| vdsm-network-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: 317810d39177b73f2f62ce4ed05aa6a6d8b5a987f9c2d8573fa4418f4e9a04f7 | 
| vdsm-network-4.30.24-2.el7ev.ppc64le.rpm | SHA-256: 317810d39177b73f2f62ce4ed05aa6a6d8b5a987f9c2d8573fa4418f4e9a04f7 | 
| vdsm-python-4.30.24-2.el7ev.noarch.rpm | SHA-256: 5a4b749df77e7cbb2a1c4e291e10128d491917e42d99908e75295ea82611a397 | 
| vdsm-python-4.30.24-2.el7ev.noarch.rpm | SHA-256: 5a4b749df77e7cbb2a1c4e291e10128d491917e42d99908e75295ea82611a397 | 
| vdsm-yajsonrpc-4.30.24-2.el7ev.noarch.rpm | SHA-256: d5b3c33cc279da814c431037f9f32d25e4c189594af9e4d8b0279e577ba663cd | 
| vdsm-yajsonrpc-4.30.24-2.el7ev.noarch.rpm | SHA-256: d5b3c33cc279da814c431037f9f32d25e4c189594af9e4d8b0279e577ba663cd | 
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.