Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2019:3009 - Bug Fix Advisory
Issued:
2019-10-10
Updated:
2019-10-10

RHBA-2019:3009 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

vdsm bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated VDSM packages that fix several bugs and add various enhancements are now available.

Description

VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts or Red Hat Enterprise Linux hosts.

Changes to the vdsm component:

  • Previously, v2v was reporting the wrong disk type when using the -o rhv and -o vdsm option; copying disks created by virt-v2v failed with: InvalidParameterException: Invalid parameter: 'DiskType=1'. Although the issue of assigning the wrong disk type was fixed in virt-v2v upstream, we must be able to copy disks created using the "broken" version of virt-v2v. The current release enables us to do this by adding support for that incorrect disk type, "1". (BZ#1748395)
  • Previously, trying to enable virtual functions (VFs) on a Broadcom network card generated a "Failed to change the number of virtual functions" error. The current release fixes this issue. (BZ#1691760)
  • The current release rebuilds Red Hat Virtualization (4.3.6) for the current version of Red Hat Enterprise Linux 7. (BZ#1734619)
  • Previously, while VDSM service was starting, the nwfilter configuration removed and recreated the 'vdsm-no-mac-spoofing' network filter definition to ensure the filter was up to date. If many vNICs were using the filter, that operation took longer than expected and caused the VDSM startup to timeout. The current release fixes this issue by updating the filter, which takes less than a second independent of how many vNICs are using the filter. (BZ#1740498)
  • Previously, while powering off a virtual machine, the RHV Manager occasionally displayed an error message that the VDSM Get Host Statistics command failed due to an Internal JSON-RPC error: {'reason': '[Errno 19] vnet111 is not present in the system'}. This error occurred because an interface disappeared while the host statistics were being gathered. The current release fixes this issue by suppressing this error under these conditions. (BZ#1744572)
  • Previously, some virtual machine operations unnecessarily blocked other VM operations. This led to some problems with monitoring while shutting down large virtual machines. The current release fixes these issues: It relaxes some conditions for blocking virtual machine operations and makes blocking safer. This should reduce monitoring problems experienced in some scenarios. (BZ#1660451)
  • vdsm now requires a host kernel with fix for CVE-2019-14835 (BZ#1753116)
  • Previously, the gluster fencing policy check failed due to a non-iterable object and threw an exception. The code also contained a minor typo. The current release fixes these issues. (BZ#1746718)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le

Fixes

  • BZ - 1660451 - Executor queue can get full if vm.destroy takes some time to complete
  • BZ - 1691760 - [SR-IOV] cannot enable VF on broadcom network card
  • BZ - 1734619 - Build VDSM 4.3.6 - RHEL 7
  • BZ - 1740498 - [downstream clone - 4.3.6] Remove nwfilter configuration from the vdsmd service start
  • BZ - 1744572 - [downstream clone - 4.3.6] VDSM command Get Host Statistics failed: Internal JSON-RPC error: {'reason': '[Errno 19] vnet<x> is not present in the system'}
  • BZ - 1746718 - [downstream clone - 4.3.6] Typo and exception due to non-iterable object on gluster fencing testing
  • BZ - 1748395 - [downstream clone - 4.3.6] Can't import guest from export domain to data domain on rhv4.3 due to error "Invalid parameter: 'DiskType=1'"
  • BZ - 1753116 - require updated kernel for CVE-2019-14835
  • BZ - 1753898 - Make block size detection compatible with Gluster storage
  • BZ - 1755271 - [downstream clone - 4.3.6] Make block size detection compatible with Gluster storage

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
vdsm-4.30.33-1.el7ev.src.rpm SHA-256: d1e7e130a19bad8ebe9be5825397431792d31e9c84b0e91fdb46d25cc79f4324
x86_64
vdsm-4.30.33-1.el7ev.x86_64.rpm SHA-256: 32f19291e4208b2689d6781a08e15cfa84cc85142bd5d69791ad92137c63b7f5
vdsm-api-4.30.33-1.el7ev.noarch.rpm SHA-256: a816fac0d69201f8000fc0ea68930fb753a257bbc4557adb04dc9ae442b1cae9
vdsm-client-4.30.33-1.el7ev.noarch.rpm SHA-256: d5ac8da427d5636c91712f08b44577a134a979766a6307f33d95935dad7ff221
vdsm-common-4.30.33-1.el7ev.noarch.rpm SHA-256: f6aaf687f592a5e254bfc772753b7b8aa68be3dd9e063b326c272d4bd8938004
vdsm-gluster-4.30.33-1.el7ev.x86_64.rpm SHA-256: bbab90f0de46bad1bec3b39c0ef72db1968256bf779bb3f50bcf144d54bfffc3
vdsm-hook-checkips-4.30.33-1.el7ev.x86_64.rpm SHA-256: 80b75c69d9a61f730473e938e762f1b65b435fafc7cb181b06dcde635fc6688f
vdsm-hook-cpuflags-4.30.33-1.el7ev.noarch.rpm SHA-256: 1aa523f2b25a32159113bc89a9a49ca57ef54a9dbefe954cb647c56b7615155d
vdsm-hook-ethtool-options-4.30.33-1.el7ev.noarch.rpm SHA-256: b432813b83ec6c0f984e786cbd24872a7f6b234bfbd293a38ae229877c30fdf8
vdsm-hook-extra-ipv4-addrs-4.30.33-1.el7ev.x86_64.rpm SHA-256: f3160c5ef264cdcc6e1e6d566fba29ea39f69df52e11a0ea29a2914423fffc92
vdsm-hook-fcoe-4.30.33-1.el7ev.noarch.rpm SHA-256: abc67faa144de6eccc7feb50625ca2cd4cddaae5650c5030e2026a87d3d880e6
vdsm-hook-localdisk-4.30.33-1.el7ev.noarch.rpm SHA-256: bd78ba3e5565f45a010c5154b1cdc60a566ff4ad566efcc5b2af41db6bd1906f
vdsm-hook-macspoof-4.30.33-1.el7ev.noarch.rpm SHA-256: 825276820100f4c90cd9091ed2368e18905a3cb0f9731481dd5a9a8b66a7a59c
vdsm-hook-nestedvt-4.30.33-1.el7ev.noarch.rpm SHA-256: 5222c5e6b2b3be0b60e5c4afed401a53a758793522be861c9b41c62f9beaeb5a
vdsm-hook-openstacknet-4.30.33-1.el7ev.noarch.rpm SHA-256: 6fb779ac47cde9fc731216d535453082d503d1311d0e716e4fc5c2c1a7a4ce75
vdsm-hook-vhostmd-4.30.33-1.el7ev.noarch.rpm SHA-256: 82632cb05e32f8e925cb9e108b8c95378b0351c260fa58b2445c02371a41641c
vdsm-hook-vmfex-dev-4.30.33-1.el7ev.noarch.rpm SHA-256: 3d3efc4a38e19b76c881f2844ad3466fdad984140803d16b7597effbcf6c61a3
vdsm-http-4.30.33-1.el7ev.noarch.rpm SHA-256: 2a1e07d3d212a258811628998594f718ae751b0097ae1f28c1e56e20eccc4278
vdsm-jsonrpc-4.30.33-1.el7ev.noarch.rpm SHA-256: f1c1722434394418bd7ee7a818bc93cac16dbd9f8fc4268c6572e83a82558388
vdsm-network-4.30.33-1.el7ev.x86_64.rpm SHA-256: ed9ca129a38b55f0ddfa859d20d13bd3ce612f4b6dd8c72bbcf9ade611d1ee94
vdsm-python-4.30.33-1.el7ev.noarch.rpm SHA-256: e378335ef41a7cbc53e3e22b9eaa93a31e35bd0ebb56f6dd5420d21929b2c50c
vdsm-yajsonrpc-4.30.33-1.el7ev.noarch.rpm SHA-256: 7b39d4a394d0ab6c6b78fb2f95f0f0c22fae974b4a1e1f730e4adece650c8e5c

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
vdsm-4.30.33-1.el7ev.src.rpm SHA-256: d1e7e130a19bad8ebe9be5825397431792d31e9c84b0e91fdb46d25cc79f4324
ppc64le
vdsm-4.30.33-1.el7ev.ppc64le.rpm SHA-256: 1f47b171533b11f3fa5c221badf1775e03457743c03b74362a82e7312d84497a
vdsm-4.30.33-1.el7ev.ppc64le.rpm SHA-256: 1f47b171533b11f3fa5c221badf1775e03457743c03b74362a82e7312d84497a
vdsm-api-4.30.33-1.el7ev.noarch.rpm SHA-256: a816fac0d69201f8000fc0ea68930fb753a257bbc4557adb04dc9ae442b1cae9
vdsm-api-4.30.33-1.el7ev.noarch.rpm SHA-256: a816fac0d69201f8000fc0ea68930fb753a257bbc4557adb04dc9ae442b1cae9
vdsm-client-4.30.33-1.el7ev.noarch.rpm SHA-256: d5ac8da427d5636c91712f08b44577a134a979766a6307f33d95935dad7ff221
vdsm-client-4.30.33-1.el7ev.noarch.rpm SHA-256: d5ac8da427d5636c91712f08b44577a134a979766a6307f33d95935dad7ff221
vdsm-common-4.30.33-1.el7ev.noarch.rpm SHA-256: f6aaf687f592a5e254bfc772753b7b8aa68be3dd9e063b326c272d4bd8938004
vdsm-common-4.30.33-1.el7ev.noarch.rpm SHA-256: f6aaf687f592a5e254bfc772753b7b8aa68be3dd9e063b326c272d4bd8938004
vdsm-gluster-4.30.33-1.el7ev.ppc64le.rpm SHA-256: e1761dafbd93496479aea78fd63047123e615abc1fab1402ca8ef3cc91b51ea1
vdsm-gluster-4.30.33-1.el7ev.ppc64le.rpm SHA-256: e1761dafbd93496479aea78fd63047123e615abc1fab1402ca8ef3cc91b51ea1
vdsm-hook-checkips-4.30.33-1.el7ev.ppc64le.rpm SHA-256: d7053f9fee9d263da520c8c1e740b97fd05152f3805d81d1b01c6ef6d6d94e0e
vdsm-hook-checkips-4.30.33-1.el7ev.ppc64le.rpm SHA-256: d7053f9fee9d263da520c8c1e740b97fd05152f3805d81d1b01c6ef6d6d94e0e
vdsm-hook-cpuflags-4.30.33-1.el7ev.noarch.rpm SHA-256: 1aa523f2b25a32159113bc89a9a49ca57ef54a9dbefe954cb647c56b7615155d
vdsm-hook-cpuflags-4.30.33-1.el7ev.noarch.rpm SHA-256: 1aa523f2b25a32159113bc89a9a49ca57ef54a9dbefe954cb647c56b7615155d
vdsm-hook-ethtool-options-4.30.33-1.el7ev.noarch.rpm SHA-256: b432813b83ec6c0f984e786cbd24872a7f6b234bfbd293a38ae229877c30fdf8
vdsm-hook-ethtool-options-4.30.33-1.el7ev.noarch.rpm SHA-256: b432813b83ec6c0f984e786cbd24872a7f6b234bfbd293a38ae229877c30fdf8
vdsm-hook-extra-ipv4-addrs-4.30.33-1.el7ev.ppc64le.rpm SHA-256: d84e3ca3786029dc01b7ae6a35da7ba012554f4866c41fd9711eac2176ea27be
vdsm-hook-extra-ipv4-addrs-4.30.33-1.el7ev.ppc64le.rpm SHA-256: d84e3ca3786029dc01b7ae6a35da7ba012554f4866c41fd9711eac2176ea27be
vdsm-hook-fcoe-4.30.33-1.el7ev.noarch.rpm SHA-256: abc67faa144de6eccc7feb50625ca2cd4cddaae5650c5030e2026a87d3d880e6
vdsm-hook-fcoe-4.30.33-1.el7ev.noarch.rpm SHA-256: abc67faa144de6eccc7feb50625ca2cd4cddaae5650c5030e2026a87d3d880e6
vdsm-hook-localdisk-4.30.33-1.el7ev.noarch.rpm SHA-256: bd78ba3e5565f45a010c5154b1cdc60a566ff4ad566efcc5b2af41db6bd1906f
vdsm-hook-localdisk-4.30.33-1.el7ev.noarch.rpm SHA-256: bd78ba3e5565f45a010c5154b1cdc60a566ff4ad566efcc5b2af41db6bd1906f
vdsm-hook-macspoof-4.30.33-1.el7ev.noarch.rpm SHA-256: 825276820100f4c90cd9091ed2368e18905a3cb0f9731481dd5a9a8b66a7a59c
vdsm-hook-macspoof-4.30.33-1.el7ev.noarch.rpm SHA-256: 825276820100f4c90cd9091ed2368e18905a3cb0f9731481dd5a9a8b66a7a59c
vdsm-hook-nestedvt-4.30.33-1.el7ev.noarch.rpm SHA-256: 5222c5e6b2b3be0b60e5c4afed401a53a758793522be861c9b41c62f9beaeb5a
vdsm-hook-nestedvt-4.30.33-1.el7ev.noarch.rpm SHA-256: 5222c5e6b2b3be0b60e5c4afed401a53a758793522be861c9b41c62f9beaeb5a
vdsm-hook-openstacknet-4.30.33-1.el7ev.noarch.rpm SHA-256: 6fb779ac47cde9fc731216d535453082d503d1311d0e716e4fc5c2c1a7a4ce75
vdsm-hook-openstacknet-4.30.33-1.el7ev.noarch.rpm SHA-256: 6fb779ac47cde9fc731216d535453082d503d1311d0e716e4fc5c2c1a7a4ce75
vdsm-hook-vhostmd-4.30.33-1.el7ev.noarch.rpm SHA-256: 82632cb05e32f8e925cb9e108b8c95378b0351c260fa58b2445c02371a41641c
vdsm-hook-vhostmd-4.30.33-1.el7ev.noarch.rpm SHA-256: 82632cb05e32f8e925cb9e108b8c95378b0351c260fa58b2445c02371a41641c
vdsm-hook-vmfex-dev-4.30.33-1.el7ev.noarch.rpm SHA-256: 3d3efc4a38e19b76c881f2844ad3466fdad984140803d16b7597effbcf6c61a3
vdsm-hook-vmfex-dev-4.30.33-1.el7ev.noarch.rpm SHA-256: 3d3efc4a38e19b76c881f2844ad3466fdad984140803d16b7597effbcf6c61a3
vdsm-http-4.30.33-1.el7ev.noarch.rpm SHA-256: 2a1e07d3d212a258811628998594f718ae751b0097ae1f28c1e56e20eccc4278
vdsm-http-4.30.33-1.el7ev.noarch.rpm SHA-256: 2a1e07d3d212a258811628998594f718ae751b0097ae1f28c1e56e20eccc4278
vdsm-jsonrpc-4.30.33-1.el7ev.noarch.rpm SHA-256: f1c1722434394418bd7ee7a818bc93cac16dbd9f8fc4268c6572e83a82558388
vdsm-jsonrpc-4.30.33-1.el7ev.noarch.rpm SHA-256: f1c1722434394418bd7ee7a818bc93cac16dbd9f8fc4268c6572e83a82558388
vdsm-network-4.30.33-1.el7ev.ppc64le.rpm SHA-256: 3070da318d0e93f3d49b5532823469bfc262686cc0022f85a2d32ca71c7d78ff
vdsm-network-4.30.33-1.el7ev.ppc64le.rpm SHA-256: 3070da318d0e93f3d49b5532823469bfc262686cc0022f85a2d32ca71c7d78ff
vdsm-python-4.30.33-1.el7ev.noarch.rpm SHA-256: e378335ef41a7cbc53e3e22b9eaa93a31e35bd0ebb56f6dd5420d21929b2c50c
vdsm-python-4.30.33-1.el7ev.noarch.rpm SHA-256: e378335ef41a7cbc53e3e22b9eaa93a31e35bd0ebb56f6dd5420d21929b2c50c
vdsm-yajsonrpc-4.30.33-1.el7ev.noarch.rpm SHA-256: 7b39d4a394d0ab6c6b78fb2f95f0f0c22fae974b4a1e1f730e4adece650c8e5c
vdsm-yajsonrpc-4.30.33-1.el7ev.noarch.rpm SHA-256: 7b39d4a394d0ab6c6b78fb2f95f0f0c22fae974b4a1e1f730e4adece650c8e5c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility