- Issued:
- 2019-12-12
- Updated:
- 2019-12-12
RHBA-2019:4230 - Bug Fix Advisory
Synopsis
Red Hat Virtualization RHEL Host (ovirt-host) 4.3.7
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated host packages that fix several bugs and add various enhancements are now available.
Description
The ovirt-host package consolidates host package requirements into a single meta-package.
The ovirt-hosted-engine-ha package enables the self-hosted engine to be highly available. A self-hosted engine is a virtualized environment in which the Red Hat Virtualization Manager runs on a virtual machine on the hosts managed by the Manager. If the host running the virtual machine goes into maintenance, the virtual machine is migrated automatically to another host in the environment.
The vdsm package is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts (RHVH) or Red Hat Enterprise Linux hosts.
Changes to the ovirt-host component:
- Previously, using LUKS alone was a problem because the Red Hat Virtualization Manager could reboot a node using Power Management commands. However, the node would not reboot because it was waiting for the user to enter a decrypt/open/unlock passphrase. This release fixes the issue by adding clevis RPMs to the Red Hat Virtualization Host (RHVH) image. As a result, a Manager can automatically unlock/decrypt/open an RHVH using TPM or NBDE. (BZ#1759015)
Changes to the ovirt-hosted-engine-ha component:
- This release upgrades ovirt-hosted-engine-ha to version 2.3.6. (BZ#1771557)
Changes to the vdsm component:
- Previously, NICs on a Red Hat Virtualization Host you had configured to remain off were turned back on after rebooting. This happened because a bug expanded %{_libdir} to /usr/lib64 instead of /usr/lib and failed to disable clevis. The current release fixes this bug so that these NICs remain off. (BZ#1768337)
- Previously, NICs on a Red Hat Virtualization Host you had configured to use "Shared" or "Link-local" mode did not apply the configuration after reboot. The current release fixes this issue and uses the selected mode after rebooting. (BZ#1768353)
- On a self-hosted Red Hat Virtualization Manager, ovirt-ha-broker restarts if it encounters an issue reading or writing to storage. Previously, in some cases, this caused VDSM to get stuck and report the status of the host as "Not Responding" and "Connecting" until the user restarted the Manager. The workaround for this issue was to restart the Manager. The current release mitigates this issue by adding a 5-seconds delay before VDSM sends a report to the Manager that a host is down. (BZ#1745715)
- Previously, when a system had many Fibre Channel (FC) LUNs with many paths per LUN and a high I/O load, scanning of FC devices became slow. This caused timeouts in monitoring virtual machine disk size and made virtual machines non-responsive. The current release mitigates this issue by optimizing FC scans for speed, and VM are much less likely to become non-responsive. (BZ#1758094)
- Previously, stopping, killing, or restarting the VDSM service on the Storage Pool Manager (SPM VDSM) while performing a live storage migration risked corrupting the virtual disk data. The current release removes ExecStopPost from the VDSM service to help prevent data corruption on virtual disks during live storage migration. (BZ#1768167)
- The Administration Portal showed very high memory usage for a host with no VMs running. As a result, VMs could not be migrated to that host.
In this release, the free host memory is evaluated correctly. (BZ#1757697)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1745715 - [downstream clone - 4.3.7] Host in "Not Responding" and "Connecting" state until engine restarted
- BZ - 1757697 - [downstream clone - 4.3.7] Reporting incorrect high memory usage, preventing VMs from migrating, high slab dentry
- BZ - 1758094 - [downstream clone - 4.3.7] [scale] VMs unresponsive due to delayed getVolumeSize
- BZ - 1759015 - [downstream clone - 4.3.7] Add clevis RPMs to RHV-H image / repo
- BZ - 1768167 - [downstream clone - 4.3.7] Chance of data corruption if SPM VDSM is restarted during live storage migration
- BZ - 1768337 - [RHVH4.3.7] The NICs are turned off during installation, but found that all NICs are open after installation
- BZ - 1768353 - [RHVH4.3.7] After rebooting, the NICs Configuration with "Shared" mode or "Link local" mode cannot be persisted
- BZ - 1771557 - Upgrade ovirt-hosted-engine-ha to 2.3.6
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
ovirt-host-4.3.5-1.el7ev.src.rpm | SHA-256: 886e1a6b2f26a65d7fbd3271f6b0fb6c16bd243d2d35798752b419620a92ad05 |
ovirt-hosted-engine-ha-2.3.6-1.el7ev.src.rpm | SHA-256: 7ebc2f8a32e420fe8ac6e0393a35da96508e0c75f037a7bedef2326208e68916 |
vdsm-4.30.38-1.el7ev.src.rpm | SHA-256: 48baded209044f04d74e8e7439ea1566d038c7a6e04cd6572e7404c20bd269fb |
x86_64 | |
ovirt-host-4.3.5-1.el7ev.x86_64.rpm | SHA-256: f1871a433cd9bfe826522efc37a71dbbdf760c300f154ce8a92324e4d83d74f4 |
ovirt-host-dependencies-4.3.5-1.el7ev.x86_64.rpm | SHA-256: b1954531a939e29a14eb69808d4156edcf0e961c38e269d98e52dfe9f9cb9e84 |
ovirt-hosted-engine-ha-2.3.6-1.el7ev.noarch.rpm | SHA-256: 263adc98ccc74644c177a7c328fd9de456147b99caf299ab8c67f4417c345c6b |
vdsm-4.30.38-1.el7ev.x86_64.rpm | SHA-256: 4a840b7a84d5bbb61d30a09f28bb537bc62309f189641259647a15567f6b1da3 |
vdsm-api-4.30.38-1.el7ev.noarch.rpm | SHA-256: 9b7dd333d60767198dca68dccf4bd915fb77c1bbe0fc506c6ac9f8e7307b5293 |
vdsm-client-4.30.38-1.el7ev.noarch.rpm | SHA-256: 6091ceb9dac5744fad7dfe7a0a5288a57728136d64bfae4c5d0ed797d836c254 |
vdsm-common-4.30.38-1.el7ev.noarch.rpm | SHA-256: 28a6ef20e796dddbc1a7e5f6dbf5e7c0e393dc5c0f711dcec56826f548eab950 |
vdsm-gluster-4.30.38-1.el7ev.x86_64.rpm | SHA-256: 4e0eeec303e5493c62f296a342c0b91ef92b9527ee59bef034f27def2e298789 |
vdsm-hook-checkips-4.30.38-1.el7ev.x86_64.rpm | SHA-256: 93d8b9272a6887b22ee59186d830d0768568554436fa555c984c3bc7f41f26cf |
vdsm-hook-cpuflags-4.30.38-1.el7ev.noarch.rpm | SHA-256: cc690b9a72760089cba3045213e140bb3a5a487c2423c7eb560f05a572221a4f |
vdsm-hook-ethtool-options-4.30.38-1.el7ev.noarch.rpm | SHA-256: f22d60fbb408cd551df18ed5b6ff0271ef0e1ff47d57338594e5cc707ceaa95c |
vdsm-hook-extra-ipv4-addrs-4.30.38-1.el7ev.x86_64.rpm | SHA-256: f8fe42b4afdf63815a51926b34bdf235849df6a2b87c0514e2eaf361ba5f9c1a |
vdsm-hook-fcoe-4.30.38-1.el7ev.noarch.rpm | SHA-256: b57d77bc4a3d2a11a40a78964141b2e778bdd701c80933ce4e86fbd99cabfb4e |
vdsm-hook-localdisk-4.30.38-1.el7ev.noarch.rpm | SHA-256: b48e03675291fb2428ced81c33ce72cc3cb0f40e9f368ca01704c7e8d69e18d9 |
vdsm-hook-macspoof-4.30.38-1.el7ev.noarch.rpm | SHA-256: f899454a7e18dedffd543b6f474ba1ca69a9586f09c4d9f9eff5891c9897aef4 |
vdsm-hook-nestedvt-4.30.38-1.el7ev.noarch.rpm | SHA-256: b5a10ce936dd9630af7de73255d211997625464ba912001eb5c59895953ff18b |
vdsm-hook-openstacknet-4.30.38-1.el7ev.noarch.rpm | SHA-256: e8006418c0a299f444d13f0f35ea24152f04df74a6b1764bad7014131a5ff335 |
vdsm-hook-vhostmd-4.30.38-1.el7ev.noarch.rpm | SHA-256: 54da8dacaf166378c010d8307e884a9891f67ec23bf68318468e702c2613f7ed |
vdsm-hook-vmfex-dev-4.30.38-1.el7ev.noarch.rpm | SHA-256: baa28bd46d21476f93d1bb80bef8d248f430b5233419917682c640df4764657e |
vdsm-http-4.30.38-1.el7ev.noarch.rpm | SHA-256: b7d8ad3c64bd1e5026029f173f87be16aeee7965f1e8c3826d510435ba2658f0 |
vdsm-jsonrpc-4.30.38-1.el7ev.noarch.rpm | SHA-256: 76f01afe5623812aa564678ca7acc6ce907e4585a2c8498369a9555c843a69b0 |
vdsm-network-4.30.38-1.el7ev.x86_64.rpm | SHA-256: ee1c4573593989dc9c673d39219372ce20215b41ead0df40a14117ea94c674af |
vdsm-python-4.30.38-1.el7ev.noarch.rpm | SHA-256: fa5b428836b4f99e53bc371c6976edc0b02e326072596b42b0648be964b4f077 |
vdsm-yajsonrpc-4.30.38-1.el7ev.noarch.rpm | SHA-256: fdf3c80737326a902ef1f62b04a8e51eb18ebc9c0a29b6f51ec3e00252fc057e |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
ovirt-host-4.3.5-1.el7ev.src.rpm | SHA-256: 886e1a6b2f26a65d7fbd3271f6b0fb6c16bd243d2d35798752b419620a92ad05 |
ovirt-hosted-engine-ha-2.3.6-1.el7ev.src.rpm | SHA-256: 7ebc2f8a32e420fe8ac6e0393a35da96508e0c75f037a7bedef2326208e68916 |
vdsm-4.30.38-1.el7ev.src.rpm | SHA-256: 48baded209044f04d74e8e7439ea1566d038c7a6e04cd6572e7404c20bd269fb |
ppc64le | |
ovirt-host-4.3.5-1.el7ev.ppc64le.rpm | SHA-256: 205dd6b332c73fe3632d8c6a5e0dea913f444687f4e3c072f5e17ed0944537ee |
ovirt-host-4.3.5-1.el7ev.ppc64le.rpm | SHA-256: 205dd6b332c73fe3632d8c6a5e0dea913f444687f4e3c072f5e17ed0944537ee |
ovirt-host-dependencies-4.3.5-1.el7ev.ppc64le.rpm | SHA-256: fef3fd450a2e2cb23dff772a365f0184371865c05c9d5f148e8a41c579db833a |
ovirt-host-dependencies-4.3.5-1.el7ev.ppc64le.rpm | SHA-256: fef3fd450a2e2cb23dff772a365f0184371865c05c9d5f148e8a41c579db833a |
vdsm-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: ad85ba5aa19377cb1ca954bab1c0d03c04a4ae8e66d89cd824a69eb30120b2d1 |
vdsm-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: ad85ba5aa19377cb1ca954bab1c0d03c04a4ae8e66d89cd824a69eb30120b2d1 |
vdsm-api-4.30.38-1.el7ev.noarch.rpm | SHA-256: 9b7dd333d60767198dca68dccf4bd915fb77c1bbe0fc506c6ac9f8e7307b5293 |
vdsm-api-4.30.38-1.el7ev.noarch.rpm | SHA-256: 9b7dd333d60767198dca68dccf4bd915fb77c1bbe0fc506c6ac9f8e7307b5293 |
vdsm-client-4.30.38-1.el7ev.noarch.rpm | SHA-256: 6091ceb9dac5744fad7dfe7a0a5288a57728136d64bfae4c5d0ed797d836c254 |
vdsm-client-4.30.38-1.el7ev.noarch.rpm | SHA-256: 6091ceb9dac5744fad7dfe7a0a5288a57728136d64bfae4c5d0ed797d836c254 |
vdsm-common-4.30.38-1.el7ev.noarch.rpm | SHA-256: 28a6ef20e796dddbc1a7e5f6dbf5e7c0e393dc5c0f711dcec56826f548eab950 |
vdsm-common-4.30.38-1.el7ev.noarch.rpm | SHA-256: 28a6ef20e796dddbc1a7e5f6dbf5e7c0e393dc5c0f711dcec56826f548eab950 |
vdsm-gluster-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: c9b0cd16904a199eb8188c9ba7532b6c6190251eddcd08a4f3b40b0d429d4004 |
vdsm-gluster-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: c9b0cd16904a199eb8188c9ba7532b6c6190251eddcd08a4f3b40b0d429d4004 |
vdsm-hook-checkips-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: 8c26cf026e829a10273e0d3408beaf65c3f3c7b448fe8d1ae4ee564af37a2fe7 |
vdsm-hook-checkips-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: 8c26cf026e829a10273e0d3408beaf65c3f3c7b448fe8d1ae4ee564af37a2fe7 |
vdsm-hook-cpuflags-4.30.38-1.el7ev.noarch.rpm | SHA-256: cc690b9a72760089cba3045213e140bb3a5a487c2423c7eb560f05a572221a4f |
vdsm-hook-cpuflags-4.30.38-1.el7ev.noarch.rpm | SHA-256: cc690b9a72760089cba3045213e140bb3a5a487c2423c7eb560f05a572221a4f |
vdsm-hook-ethtool-options-4.30.38-1.el7ev.noarch.rpm | SHA-256: f22d60fbb408cd551df18ed5b6ff0271ef0e1ff47d57338594e5cc707ceaa95c |
vdsm-hook-ethtool-options-4.30.38-1.el7ev.noarch.rpm | SHA-256: f22d60fbb408cd551df18ed5b6ff0271ef0e1ff47d57338594e5cc707ceaa95c |
vdsm-hook-extra-ipv4-addrs-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: ecdca8079d34472cd680cf43affdc9d56ad924b77a6ea3c5b2e361b404d6718b |
vdsm-hook-extra-ipv4-addrs-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: ecdca8079d34472cd680cf43affdc9d56ad924b77a6ea3c5b2e361b404d6718b |
vdsm-hook-fcoe-4.30.38-1.el7ev.noarch.rpm | SHA-256: b57d77bc4a3d2a11a40a78964141b2e778bdd701c80933ce4e86fbd99cabfb4e |
vdsm-hook-fcoe-4.30.38-1.el7ev.noarch.rpm | SHA-256: b57d77bc4a3d2a11a40a78964141b2e778bdd701c80933ce4e86fbd99cabfb4e |
vdsm-hook-localdisk-4.30.38-1.el7ev.noarch.rpm | SHA-256: b48e03675291fb2428ced81c33ce72cc3cb0f40e9f368ca01704c7e8d69e18d9 |
vdsm-hook-localdisk-4.30.38-1.el7ev.noarch.rpm | SHA-256: b48e03675291fb2428ced81c33ce72cc3cb0f40e9f368ca01704c7e8d69e18d9 |
vdsm-hook-macspoof-4.30.38-1.el7ev.noarch.rpm | SHA-256: f899454a7e18dedffd543b6f474ba1ca69a9586f09c4d9f9eff5891c9897aef4 |
vdsm-hook-macspoof-4.30.38-1.el7ev.noarch.rpm | SHA-256: f899454a7e18dedffd543b6f474ba1ca69a9586f09c4d9f9eff5891c9897aef4 |
vdsm-hook-nestedvt-4.30.38-1.el7ev.noarch.rpm | SHA-256: b5a10ce936dd9630af7de73255d211997625464ba912001eb5c59895953ff18b |
vdsm-hook-nestedvt-4.30.38-1.el7ev.noarch.rpm | SHA-256: b5a10ce936dd9630af7de73255d211997625464ba912001eb5c59895953ff18b |
vdsm-hook-openstacknet-4.30.38-1.el7ev.noarch.rpm | SHA-256: e8006418c0a299f444d13f0f35ea24152f04df74a6b1764bad7014131a5ff335 |
vdsm-hook-openstacknet-4.30.38-1.el7ev.noarch.rpm | SHA-256: e8006418c0a299f444d13f0f35ea24152f04df74a6b1764bad7014131a5ff335 |
vdsm-hook-vhostmd-4.30.38-1.el7ev.noarch.rpm | SHA-256: 54da8dacaf166378c010d8307e884a9891f67ec23bf68318468e702c2613f7ed |
vdsm-hook-vhostmd-4.30.38-1.el7ev.noarch.rpm | SHA-256: 54da8dacaf166378c010d8307e884a9891f67ec23bf68318468e702c2613f7ed |
vdsm-hook-vmfex-dev-4.30.38-1.el7ev.noarch.rpm | SHA-256: baa28bd46d21476f93d1bb80bef8d248f430b5233419917682c640df4764657e |
vdsm-hook-vmfex-dev-4.30.38-1.el7ev.noarch.rpm | SHA-256: baa28bd46d21476f93d1bb80bef8d248f430b5233419917682c640df4764657e |
vdsm-http-4.30.38-1.el7ev.noarch.rpm | SHA-256: b7d8ad3c64bd1e5026029f173f87be16aeee7965f1e8c3826d510435ba2658f0 |
vdsm-http-4.30.38-1.el7ev.noarch.rpm | SHA-256: b7d8ad3c64bd1e5026029f173f87be16aeee7965f1e8c3826d510435ba2658f0 |
vdsm-jsonrpc-4.30.38-1.el7ev.noarch.rpm | SHA-256: 76f01afe5623812aa564678ca7acc6ce907e4585a2c8498369a9555c843a69b0 |
vdsm-jsonrpc-4.30.38-1.el7ev.noarch.rpm | SHA-256: 76f01afe5623812aa564678ca7acc6ce907e4585a2c8498369a9555c843a69b0 |
vdsm-network-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: af6e812e7635552a2ea32004cdf0730704b4df3f9192fd4a80df6dcfff91772c |
vdsm-network-4.30.38-1.el7ev.ppc64le.rpm | SHA-256: af6e812e7635552a2ea32004cdf0730704b4df3f9192fd4a80df6dcfff91772c |
vdsm-python-4.30.38-1.el7ev.noarch.rpm | SHA-256: fa5b428836b4f99e53bc371c6976edc0b02e326072596b42b0648be964b4f077 |
vdsm-python-4.30.38-1.el7ev.noarch.rpm | SHA-256: fa5b428836b4f99e53bc371c6976edc0b02e326072596b42b0648be964b4f077 |
vdsm-yajsonrpc-4.30.38-1.el7ev.noarch.rpm | SHA-256: fdf3c80737326a902ef1f62b04a8e51eb18ebc9c0a29b6f51ec3e00252fc057e |
vdsm-yajsonrpc-4.30.38-1.el7ev.noarch.rpm | SHA-256: fdf3c80737326a902ef1f62b04a8e51eb18ebc9c0a29b6f51ec3e00252fc057e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.