- Issued:
- 2019-10-10
- Updated:
- 2019-10-10
RHBA-2019:3009 - Bug Fix Advisory
Synopsis
vdsm bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated VDSM packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, v2v was reporting the wrong disk type when using the -o rhv and -o vdsm option; copying disks created by virt-v2v failed with: InvalidParameterException: Invalid parameter: 'DiskType=1'. Although the issue of assigning the wrong disk type was fixed in virt-v2v upstream, we must be able to copy disks created using the "broken" version of virt-v2v. The current release enables us to do this by adding support for that incorrect disk type, "1". (BZ#1748395)
- Previously, trying to enable virtual functions (VFs) on a Broadcom network card generated a "Failed to change the number of virtual functions" error. The current release fixes this issue. (BZ#1691760)
- The current release rebuilds Red Hat Virtualization (4.3.6) for the current version of Red Hat Enterprise Linux 7. (BZ#1734619)
- Previously, while VDSM service was starting, the nwfilter configuration removed and recreated the 'vdsm-no-mac-spoofing' network filter definition to ensure the filter was up to date. If many vNICs were using the filter, that operation took longer than expected and caused the VDSM startup to timeout. The current release fixes this issue by updating the filter, which takes less than a second independent of how many vNICs are using the filter. (BZ#1740498)
- Previously, while powering off a virtual machine, the RHV Manager occasionally displayed an error message that the VDSM Get Host Statistics command failed due to an Internal JSON-RPC error: {'reason': '[Errno 19] vnet111 is not present in the system'}. This error occurred because an interface disappeared while the host statistics were being gathered. The current release fixes this issue by suppressing this error under these conditions. (BZ#1744572)
- Previously, some virtual machine operations unnecessarily blocked other VM operations. This led to some problems with monitoring while shutting down large virtual machines. The current release fixes these issues: It relaxes some conditions for blocking virtual machine operations and makes blocking safer. This should reduce monitoring problems experienced in some scenarios. (BZ#1660451)
- vdsm now requires a host kernel with fix for CVE-2019-14835 (BZ#1753116)
- Previously, the gluster fencing policy check failed due to a non-iterable object and threw an exception. The code also contained a minor typo. The current release fixes these issues. (BZ#1746718)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1660451 - Executor queue can get full if vm.destroy takes some time to complete
- BZ - 1691760 - [SR-IOV] cannot enable VF on broadcom network card
- BZ - 1734619 - Build VDSM 4.3.6 - RHEL 7
- BZ - 1740498 - [downstream clone - 4.3.6] Remove nwfilter configuration from the vdsmd service start
- BZ - 1744572 - [downstream clone - 4.3.6] VDSM command Get Host Statistics failed: Internal JSON-RPC error: {'reason': '[Errno 19] vnet<x> is not present in the system'}
- BZ - 1746718 - [downstream clone - 4.3.6] Typo and exception due to non-iterable object on gluster fencing testing
- BZ - 1748395 - [downstream clone - 4.3.6] Can't import guest from export domain to data domain on rhv4.3 due to error "Invalid parameter: 'DiskType=1'"
- BZ - 1753116 - require updated kernel for CVE-2019-14835
- BZ - 1753898 - Make block size detection compatible with Gluster storage
- BZ - 1755271 - [downstream clone - 4.3.6] Make block size detection compatible with Gluster storage
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.30.33-1.el7ev.src.rpm | SHA-256: d1e7e130a19bad8ebe9be5825397431792d31e9c84b0e91fdb46d25cc79f4324 |
x86_64 | |
vdsm-4.30.33-1.el7ev.x86_64.rpm | SHA-256: 32f19291e4208b2689d6781a08e15cfa84cc85142bd5d69791ad92137c63b7f5 |
vdsm-api-4.30.33-1.el7ev.noarch.rpm | SHA-256: a816fac0d69201f8000fc0ea68930fb753a257bbc4557adb04dc9ae442b1cae9 |
vdsm-client-4.30.33-1.el7ev.noarch.rpm | SHA-256: d5ac8da427d5636c91712f08b44577a134a979766a6307f33d95935dad7ff221 |
vdsm-common-4.30.33-1.el7ev.noarch.rpm | SHA-256: f6aaf687f592a5e254bfc772753b7b8aa68be3dd9e063b326c272d4bd8938004 |
vdsm-gluster-4.30.33-1.el7ev.x86_64.rpm | SHA-256: bbab90f0de46bad1bec3b39c0ef72db1968256bf779bb3f50bcf144d54bfffc3 |
vdsm-hook-checkips-4.30.33-1.el7ev.x86_64.rpm | SHA-256: 80b75c69d9a61f730473e938e762f1b65b435fafc7cb181b06dcde635fc6688f |
vdsm-hook-cpuflags-4.30.33-1.el7ev.noarch.rpm | SHA-256: 1aa523f2b25a32159113bc89a9a49ca57ef54a9dbefe954cb647c56b7615155d |
vdsm-hook-ethtool-options-4.30.33-1.el7ev.noarch.rpm | SHA-256: b432813b83ec6c0f984e786cbd24872a7f6b234bfbd293a38ae229877c30fdf8 |
vdsm-hook-extra-ipv4-addrs-4.30.33-1.el7ev.x86_64.rpm | SHA-256: f3160c5ef264cdcc6e1e6d566fba29ea39f69df52e11a0ea29a2914423fffc92 |
vdsm-hook-fcoe-4.30.33-1.el7ev.noarch.rpm | SHA-256: abc67faa144de6eccc7feb50625ca2cd4cddaae5650c5030e2026a87d3d880e6 |
vdsm-hook-localdisk-4.30.33-1.el7ev.noarch.rpm | SHA-256: bd78ba3e5565f45a010c5154b1cdc60a566ff4ad566efcc5b2af41db6bd1906f |
vdsm-hook-macspoof-4.30.33-1.el7ev.noarch.rpm | SHA-256: 825276820100f4c90cd9091ed2368e18905a3cb0f9731481dd5a9a8b66a7a59c |
vdsm-hook-nestedvt-4.30.33-1.el7ev.noarch.rpm | SHA-256: 5222c5e6b2b3be0b60e5c4afed401a53a758793522be861c9b41c62f9beaeb5a |
vdsm-hook-openstacknet-4.30.33-1.el7ev.noarch.rpm | SHA-256: 6fb779ac47cde9fc731216d535453082d503d1311d0e716e4fc5c2c1a7a4ce75 |
vdsm-hook-vhostmd-4.30.33-1.el7ev.noarch.rpm | SHA-256: 82632cb05e32f8e925cb9e108b8c95378b0351c260fa58b2445c02371a41641c |
vdsm-hook-vmfex-dev-4.30.33-1.el7ev.noarch.rpm | SHA-256: 3d3efc4a38e19b76c881f2844ad3466fdad984140803d16b7597effbcf6c61a3 |
vdsm-http-4.30.33-1.el7ev.noarch.rpm | SHA-256: 2a1e07d3d212a258811628998594f718ae751b0097ae1f28c1e56e20eccc4278 |
vdsm-jsonrpc-4.30.33-1.el7ev.noarch.rpm | SHA-256: f1c1722434394418bd7ee7a818bc93cac16dbd9f8fc4268c6572e83a82558388 |
vdsm-network-4.30.33-1.el7ev.x86_64.rpm | SHA-256: ed9ca129a38b55f0ddfa859d20d13bd3ce612f4b6dd8c72bbcf9ade611d1ee94 |
vdsm-python-4.30.33-1.el7ev.noarch.rpm | SHA-256: e378335ef41a7cbc53e3e22b9eaa93a31e35bd0ebb56f6dd5420d21929b2c50c |
vdsm-yajsonrpc-4.30.33-1.el7ev.noarch.rpm | SHA-256: 7b39d4a394d0ab6c6b78fb2f95f0f0c22fae974b4a1e1f730e4adece650c8e5c |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.30.33-1.el7ev.src.rpm | SHA-256: d1e7e130a19bad8ebe9be5825397431792d31e9c84b0e91fdb46d25cc79f4324 |
ppc64le | |
vdsm-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: 1f47b171533b11f3fa5c221badf1775e03457743c03b74362a82e7312d84497a |
vdsm-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: 1f47b171533b11f3fa5c221badf1775e03457743c03b74362a82e7312d84497a |
vdsm-api-4.30.33-1.el7ev.noarch.rpm | SHA-256: a816fac0d69201f8000fc0ea68930fb753a257bbc4557adb04dc9ae442b1cae9 |
vdsm-api-4.30.33-1.el7ev.noarch.rpm | SHA-256: a816fac0d69201f8000fc0ea68930fb753a257bbc4557adb04dc9ae442b1cae9 |
vdsm-client-4.30.33-1.el7ev.noarch.rpm | SHA-256: d5ac8da427d5636c91712f08b44577a134a979766a6307f33d95935dad7ff221 |
vdsm-client-4.30.33-1.el7ev.noarch.rpm | SHA-256: d5ac8da427d5636c91712f08b44577a134a979766a6307f33d95935dad7ff221 |
vdsm-common-4.30.33-1.el7ev.noarch.rpm | SHA-256: f6aaf687f592a5e254bfc772753b7b8aa68be3dd9e063b326c272d4bd8938004 |
vdsm-common-4.30.33-1.el7ev.noarch.rpm | SHA-256: f6aaf687f592a5e254bfc772753b7b8aa68be3dd9e063b326c272d4bd8938004 |
vdsm-gluster-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: e1761dafbd93496479aea78fd63047123e615abc1fab1402ca8ef3cc91b51ea1 |
vdsm-gluster-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: e1761dafbd93496479aea78fd63047123e615abc1fab1402ca8ef3cc91b51ea1 |
vdsm-hook-checkips-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: d7053f9fee9d263da520c8c1e740b97fd05152f3805d81d1b01c6ef6d6d94e0e |
vdsm-hook-checkips-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: d7053f9fee9d263da520c8c1e740b97fd05152f3805d81d1b01c6ef6d6d94e0e |
vdsm-hook-cpuflags-4.30.33-1.el7ev.noarch.rpm | SHA-256: 1aa523f2b25a32159113bc89a9a49ca57ef54a9dbefe954cb647c56b7615155d |
vdsm-hook-cpuflags-4.30.33-1.el7ev.noarch.rpm | SHA-256: 1aa523f2b25a32159113bc89a9a49ca57ef54a9dbefe954cb647c56b7615155d |
vdsm-hook-ethtool-options-4.30.33-1.el7ev.noarch.rpm | SHA-256: b432813b83ec6c0f984e786cbd24872a7f6b234bfbd293a38ae229877c30fdf8 |
vdsm-hook-ethtool-options-4.30.33-1.el7ev.noarch.rpm | SHA-256: b432813b83ec6c0f984e786cbd24872a7f6b234bfbd293a38ae229877c30fdf8 |
vdsm-hook-extra-ipv4-addrs-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: d84e3ca3786029dc01b7ae6a35da7ba012554f4866c41fd9711eac2176ea27be |
vdsm-hook-extra-ipv4-addrs-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: d84e3ca3786029dc01b7ae6a35da7ba012554f4866c41fd9711eac2176ea27be |
vdsm-hook-fcoe-4.30.33-1.el7ev.noarch.rpm | SHA-256: abc67faa144de6eccc7feb50625ca2cd4cddaae5650c5030e2026a87d3d880e6 |
vdsm-hook-fcoe-4.30.33-1.el7ev.noarch.rpm | SHA-256: abc67faa144de6eccc7feb50625ca2cd4cddaae5650c5030e2026a87d3d880e6 |
vdsm-hook-localdisk-4.30.33-1.el7ev.noarch.rpm | SHA-256: bd78ba3e5565f45a010c5154b1cdc60a566ff4ad566efcc5b2af41db6bd1906f |
vdsm-hook-localdisk-4.30.33-1.el7ev.noarch.rpm | SHA-256: bd78ba3e5565f45a010c5154b1cdc60a566ff4ad566efcc5b2af41db6bd1906f |
vdsm-hook-macspoof-4.30.33-1.el7ev.noarch.rpm | SHA-256: 825276820100f4c90cd9091ed2368e18905a3cb0f9731481dd5a9a8b66a7a59c |
vdsm-hook-macspoof-4.30.33-1.el7ev.noarch.rpm | SHA-256: 825276820100f4c90cd9091ed2368e18905a3cb0f9731481dd5a9a8b66a7a59c |
vdsm-hook-nestedvt-4.30.33-1.el7ev.noarch.rpm | SHA-256: 5222c5e6b2b3be0b60e5c4afed401a53a758793522be861c9b41c62f9beaeb5a |
vdsm-hook-nestedvt-4.30.33-1.el7ev.noarch.rpm | SHA-256: 5222c5e6b2b3be0b60e5c4afed401a53a758793522be861c9b41c62f9beaeb5a |
vdsm-hook-openstacknet-4.30.33-1.el7ev.noarch.rpm | SHA-256: 6fb779ac47cde9fc731216d535453082d503d1311d0e716e4fc5c2c1a7a4ce75 |
vdsm-hook-openstacknet-4.30.33-1.el7ev.noarch.rpm | SHA-256: 6fb779ac47cde9fc731216d535453082d503d1311d0e716e4fc5c2c1a7a4ce75 |
vdsm-hook-vhostmd-4.30.33-1.el7ev.noarch.rpm | SHA-256: 82632cb05e32f8e925cb9e108b8c95378b0351c260fa58b2445c02371a41641c |
vdsm-hook-vhostmd-4.30.33-1.el7ev.noarch.rpm | SHA-256: 82632cb05e32f8e925cb9e108b8c95378b0351c260fa58b2445c02371a41641c |
vdsm-hook-vmfex-dev-4.30.33-1.el7ev.noarch.rpm | SHA-256: 3d3efc4a38e19b76c881f2844ad3466fdad984140803d16b7597effbcf6c61a3 |
vdsm-hook-vmfex-dev-4.30.33-1.el7ev.noarch.rpm | SHA-256: 3d3efc4a38e19b76c881f2844ad3466fdad984140803d16b7597effbcf6c61a3 |
vdsm-http-4.30.33-1.el7ev.noarch.rpm | SHA-256: 2a1e07d3d212a258811628998594f718ae751b0097ae1f28c1e56e20eccc4278 |
vdsm-http-4.30.33-1.el7ev.noarch.rpm | SHA-256: 2a1e07d3d212a258811628998594f718ae751b0097ae1f28c1e56e20eccc4278 |
vdsm-jsonrpc-4.30.33-1.el7ev.noarch.rpm | SHA-256: f1c1722434394418bd7ee7a818bc93cac16dbd9f8fc4268c6572e83a82558388 |
vdsm-jsonrpc-4.30.33-1.el7ev.noarch.rpm | SHA-256: f1c1722434394418bd7ee7a818bc93cac16dbd9f8fc4268c6572e83a82558388 |
vdsm-network-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: 3070da318d0e93f3d49b5532823469bfc262686cc0022f85a2d32ca71c7d78ff |
vdsm-network-4.30.33-1.el7ev.ppc64le.rpm | SHA-256: 3070da318d0e93f3d49b5532823469bfc262686cc0022f85a2d32ca71c7d78ff |
vdsm-python-4.30.33-1.el7ev.noarch.rpm | SHA-256: e378335ef41a7cbc53e3e22b9eaa93a31e35bd0ebb56f6dd5420d21929b2c50c |
vdsm-python-4.30.33-1.el7ev.noarch.rpm | SHA-256: e378335ef41a7cbc53e3e22b9eaa93a31e35bd0ebb56f6dd5420d21929b2c50c |
vdsm-yajsonrpc-4.30.33-1.el7ev.noarch.rpm | SHA-256: 7b39d4a394d0ab6c6b78fb2f95f0f0c22fae974b4a1e1f730e4adece650c8e5c |
vdsm-yajsonrpc-4.30.33-1.el7ev.noarch.rpm | SHA-256: 7b39d4a394d0ab6c6b78fb2f95f0f0c22fae974b4a1e1f730e4adece650c8e5c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.