Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2019:4230 - Bug Fix Advisory
Issued:
2019-12-12
Updated:
2019-12-12

RHBA-2019:4230 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat Virtualization RHEL Host (ovirt-host) 4.3.7

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated host packages that fix several bugs and add various enhancements are now available.

Description

The ovirt-host package consolidates host package requirements into a single meta-package.

The ovirt-hosted-engine-ha package enables the self-hosted engine to be highly available. A self-hosted engine is a virtualized environment in which the Red Hat Virtualization Manager runs on a virtual machine on the hosts managed by the Manager. If the host running the virtual machine goes into maintenance, the virtual machine is migrated automatically to another host in the environment.

The vdsm package is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts (RHVH) or Red Hat Enterprise Linux hosts.

Changes to the ovirt-host component:

  • Previously, using LUKS alone was a problem because the Red Hat Virtualization Manager could reboot a node using Power Management commands. However, the node would not reboot because it was waiting for the user to enter a decrypt/open/unlock passphrase. This release fixes the issue by adding clevis RPMs to the Red Hat Virtualization Host (RHVH) image. As a result, a Manager can automatically unlock/decrypt/open an RHVH using TPM or NBDE. (BZ#1759015)

Changes to the ovirt-hosted-engine-ha component:

  • This release upgrades ovirt-hosted-engine-ha to version 2.3.6. (BZ#1771557)

Changes to the vdsm component:

  • Previously, NICs on a Red Hat Virtualization Host you had configured to remain off were turned back on after rebooting. This happened because a bug expanded %{_libdir} to /usr/lib64 instead of /usr/lib and failed to disable clevis. The current release fixes this bug so that these NICs remain off. (BZ#1768337)
  • Previously, NICs on a Red Hat Virtualization Host you had configured to use "Shared" or "Link-local" mode did not apply the configuration after reboot. The current release fixes this issue and uses the selected mode after rebooting. (BZ#1768353)
  • On a self-hosted Red Hat Virtualization Manager, ovirt-ha-broker restarts if it encounters an issue reading or writing to storage. Previously, in some cases, this caused VDSM to get stuck and report the status of the host as "Not Responding" and "Connecting" until the user restarted the Manager. The workaround for this issue was to restart the Manager. The current release mitigates this issue by adding a 5-seconds delay before VDSM sends a report to the Manager that a host is down. (BZ#1745715)
  • Previously, when a system had many Fibre Channel (FC) LUNs with many paths per LUN and a high I/O load, scanning of FC devices became slow. This caused timeouts in monitoring virtual machine disk size and made virtual machines non-responsive. The current release mitigates this issue by optimizing FC scans for speed, and VM are much less likely to become non-responsive. (BZ#1758094)
  • Previously, stopping, killing, or restarting the VDSM service on the Storage Pool Manager (SPM VDSM) while performing a live storage migration risked corrupting the virtual disk data. The current release removes ExecStopPost from the VDSM service to help prevent data corruption on virtual disks during live storage migration. (BZ#1768167)
  • The Administration Portal showed very high memory usage for a host with no VMs running. As a result, VMs could not be migrated to that host.

In this release, the free host memory is evaluated correctly. (BZ#1757697)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le

Fixes

  • BZ - 1745715 - [downstream clone - 4.3.7] Host in "Not Responding" and "Connecting" state until engine restarted
  • BZ - 1757697 - [downstream clone - 4.3.7] Reporting incorrect high memory usage, preventing VMs from migrating, high slab dentry
  • BZ - 1758094 - [downstream clone - 4.3.7] [scale] VMs unresponsive due to delayed getVolumeSize
  • BZ - 1759015 - [downstream clone - 4.3.7] Add clevis RPMs to RHV-H image / repo
  • BZ - 1768167 - [downstream clone - 4.3.7] Chance of data corruption if SPM VDSM is restarted during live storage migration
  • BZ - 1768337 - [RHVH4.3.7] The NICs are turned off during installation, but found that all NICs are open after installation
  • BZ - 1768353 - [RHVH4.3.7] After rebooting, the NICs Configuration with "Shared" mode or "Link local" mode cannot be persisted
  • BZ - 1771557 - Upgrade ovirt-hosted-engine-ha to 2.3.6

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
ovirt-host-4.3.5-1.el7ev.src.rpm SHA-256: 886e1a6b2f26a65d7fbd3271f6b0fb6c16bd243d2d35798752b419620a92ad05
ovirt-hosted-engine-ha-2.3.6-1.el7ev.src.rpm SHA-256: 7ebc2f8a32e420fe8ac6e0393a35da96508e0c75f037a7bedef2326208e68916
vdsm-4.30.38-1.el7ev.src.rpm SHA-256: 48baded209044f04d74e8e7439ea1566d038c7a6e04cd6572e7404c20bd269fb
x86_64
ovirt-host-4.3.5-1.el7ev.x86_64.rpm SHA-256: f1871a433cd9bfe826522efc37a71dbbdf760c300f154ce8a92324e4d83d74f4
ovirt-host-dependencies-4.3.5-1.el7ev.x86_64.rpm SHA-256: b1954531a939e29a14eb69808d4156edcf0e961c38e269d98e52dfe9f9cb9e84
ovirt-hosted-engine-ha-2.3.6-1.el7ev.noarch.rpm SHA-256: 263adc98ccc74644c177a7c328fd9de456147b99caf299ab8c67f4417c345c6b
vdsm-4.30.38-1.el7ev.x86_64.rpm SHA-256: 4a840b7a84d5bbb61d30a09f28bb537bc62309f189641259647a15567f6b1da3
vdsm-api-4.30.38-1.el7ev.noarch.rpm SHA-256: 9b7dd333d60767198dca68dccf4bd915fb77c1bbe0fc506c6ac9f8e7307b5293
vdsm-client-4.30.38-1.el7ev.noarch.rpm SHA-256: 6091ceb9dac5744fad7dfe7a0a5288a57728136d64bfae4c5d0ed797d836c254
vdsm-common-4.30.38-1.el7ev.noarch.rpm SHA-256: 28a6ef20e796dddbc1a7e5f6dbf5e7c0e393dc5c0f711dcec56826f548eab950
vdsm-gluster-4.30.38-1.el7ev.x86_64.rpm SHA-256: 4e0eeec303e5493c62f296a342c0b91ef92b9527ee59bef034f27def2e298789
vdsm-hook-checkips-4.30.38-1.el7ev.x86_64.rpm SHA-256: 93d8b9272a6887b22ee59186d830d0768568554436fa555c984c3bc7f41f26cf
vdsm-hook-cpuflags-4.30.38-1.el7ev.noarch.rpm SHA-256: cc690b9a72760089cba3045213e140bb3a5a487c2423c7eb560f05a572221a4f
vdsm-hook-ethtool-options-4.30.38-1.el7ev.noarch.rpm SHA-256: f22d60fbb408cd551df18ed5b6ff0271ef0e1ff47d57338594e5cc707ceaa95c
vdsm-hook-extra-ipv4-addrs-4.30.38-1.el7ev.x86_64.rpm SHA-256: f8fe42b4afdf63815a51926b34bdf235849df6a2b87c0514e2eaf361ba5f9c1a
vdsm-hook-fcoe-4.30.38-1.el7ev.noarch.rpm SHA-256: b57d77bc4a3d2a11a40a78964141b2e778bdd701c80933ce4e86fbd99cabfb4e
vdsm-hook-localdisk-4.30.38-1.el7ev.noarch.rpm SHA-256: b48e03675291fb2428ced81c33ce72cc3cb0f40e9f368ca01704c7e8d69e18d9
vdsm-hook-macspoof-4.30.38-1.el7ev.noarch.rpm SHA-256: f899454a7e18dedffd543b6f474ba1ca69a9586f09c4d9f9eff5891c9897aef4
vdsm-hook-nestedvt-4.30.38-1.el7ev.noarch.rpm SHA-256: b5a10ce936dd9630af7de73255d211997625464ba912001eb5c59895953ff18b
vdsm-hook-openstacknet-4.30.38-1.el7ev.noarch.rpm SHA-256: e8006418c0a299f444d13f0f35ea24152f04df74a6b1764bad7014131a5ff335
vdsm-hook-vhostmd-4.30.38-1.el7ev.noarch.rpm SHA-256: 54da8dacaf166378c010d8307e884a9891f67ec23bf68318468e702c2613f7ed
vdsm-hook-vmfex-dev-4.30.38-1.el7ev.noarch.rpm SHA-256: baa28bd46d21476f93d1bb80bef8d248f430b5233419917682c640df4764657e
vdsm-http-4.30.38-1.el7ev.noarch.rpm SHA-256: b7d8ad3c64bd1e5026029f173f87be16aeee7965f1e8c3826d510435ba2658f0
vdsm-jsonrpc-4.30.38-1.el7ev.noarch.rpm SHA-256: 76f01afe5623812aa564678ca7acc6ce907e4585a2c8498369a9555c843a69b0
vdsm-network-4.30.38-1.el7ev.x86_64.rpm SHA-256: ee1c4573593989dc9c673d39219372ce20215b41ead0df40a14117ea94c674af
vdsm-python-4.30.38-1.el7ev.noarch.rpm SHA-256: fa5b428836b4f99e53bc371c6976edc0b02e326072596b42b0648be964b4f077
vdsm-yajsonrpc-4.30.38-1.el7ev.noarch.rpm SHA-256: fdf3c80737326a902ef1f62b04a8e51eb18ebc9c0a29b6f51ec3e00252fc057e

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
ovirt-host-4.3.5-1.el7ev.src.rpm SHA-256: 886e1a6b2f26a65d7fbd3271f6b0fb6c16bd243d2d35798752b419620a92ad05
ovirt-hosted-engine-ha-2.3.6-1.el7ev.src.rpm SHA-256: 7ebc2f8a32e420fe8ac6e0393a35da96508e0c75f037a7bedef2326208e68916
vdsm-4.30.38-1.el7ev.src.rpm SHA-256: 48baded209044f04d74e8e7439ea1566d038c7a6e04cd6572e7404c20bd269fb
ppc64le
ovirt-host-4.3.5-1.el7ev.ppc64le.rpm SHA-256: 205dd6b332c73fe3632d8c6a5e0dea913f444687f4e3c072f5e17ed0944537ee
ovirt-host-4.3.5-1.el7ev.ppc64le.rpm SHA-256: 205dd6b332c73fe3632d8c6a5e0dea913f444687f4e3c072f5e17ed0944537ee
ovirt-host-dependencies-4.3.5-1.el7ev.ppc64le.rpm SHA-256: fef3fd450a2e2cb23dff772a365f0184371865c05c9d5f148e8a41c579db833a
ovirt-host-dependencies-4.3.5-1.el7ev.ppc64le.rpm SHA-256: fef3fd450a2e2cb23dff772a365f0184371865c05c9d5f148e8a41c579db833a
vdsm-4.30.38-1.el7ev.ppc64le.rpm SHA-256: ad85ba5aa19377cb1ca954bab1c0d03c04a4ae8e66d89cd824a69eb30120b2d1
vdsm-4.30.38-1.el7ev.ppc64le.rpm SHA-256: ad85ba5aa19377cb1ca954bab1c0d03c04a4ae8e66d89cd824a69eb30120b2d1
vdsm-api-4.30.38-1.el7ev.noarch.rpm SHA-256: 9b7dd333d60767198dca68dccf4bd915fb77c1bbe0fc506c6ac9f8e7307b5293
vdsm-api-4.30.38-1.el7ev.noarch.rpm SHA-256: 9b7dd333d60767198dca68dccf4bd915fb77c1bbe0fc506c6ac9f8e7307b5293
vdsm-client-4.30.38-1.el7ev.noarch.rpm SHA-256: 6091ceb9dac5744fad7dfe7a0a5288a57728136d64bfae4c5d0ed797d836c254
vdsm-client-4.30.38-1.el7ev.noarch.rpm SHA-256: 6091ceb9dac5744fad7dfe7a0a5288a57728136d64bfae4c5d0ed797d836c254
vdsm-common-4.30.38-1.el7ev.noarch.rpm SHA-256: 28a6ef20e796dddbc1a7e5f6dbf5e7c0e393dc5c0f711dcec56826f548eab950
vdsm-common-4.30.38-1.el7ev.noarch.rpm SHA-256: 28a6ef20e796dddbc1a7e5f6dbf5e7c0e393dc5c0f711dcec56826f548eab950
vdsm-gluster-4.30.38-1.el7ev.ppc64le.rpm SHA-256: c9b0cd16904a199eb8188c9ba7532b6c6190251eddcd08a4f3b40b0d429d4004
vdsm-gluster-4.30.38-1.el7ev.ppc64le.rpm SHA-256: c9b0cd16904a199eb8188c9ba7532b6c6190251eddcd08a4f3b40b0d429d4004
vdsm-hook-checkips-4.30.38-1.el7ev.ppc64le.rpm SHA-256: 8c26cf026e829a10273e0d3408beaf65c3f3c7b448fe8d1ae4ee564af37a2fe7
vdsm-hook-checkips-4.30.38-1.el7ev.ppc64le.rpm SHA-256: 8c26cf026e829a10273e0d3408beaf65c3f3c7b448fe8d1ae4ee564af37a2fe7
vdsm-hook-cpuflags-4.30.38-1.el7ev.noarch.rpm SHA-256: cc690b9a72760089cba3045213e140bb3a5a487c2423c7eb560f05a572221a4f
vdsm-hook-cpuflags-4.30.38-1.el7ev.noarch.rpm SHA-256: cc690b9a72760089cba3045213e140bb3a5a487c2423c7eb560f05a572221a4f
vdsm-hook-ethtool-options-4.30.38-1.el7ev.noarch.rpm SHA-256: f22d60fbb408cd551df18ed5b6ff0271ef0e1ff47d57338594e5cc707ceaa95c
vdsm-hook-ethtool-options-4.30.38-1.el7ev.noarch.rpm SHA-256: f22d60fbb408cd551df18ed5b6ff0271ef0e1ff47d57338594e5cc707ceaa95c
vdsm-hook-extra-ipv4-addrs-4.30.38-1.el7ev.ppc64le.rpm SHA-256: ecdca8079d34472cd680cf43affdc9d56ad924b77a6ea3c5b2e361b404d6718b
vdsm-hook-extra-ipv4-addrs-4.30.38-1.el7ev.ppc64le.rpm SHA-256: ecdca8079d34472cd680cf43affdc9d56ad924b77a6ea3c5b2e361b404d6718b
vdsm-hook-fcoe-4.30.38-1.el7ev.noarch.rpm SHA-256: b57d77bc4a3d2a11a40a78964141b2e778bdd701c80933ce4e86fbd99cabfb4e
vdsm-hook-fcoe-4.30.38-1.el7ev.noarch.rpm SHA-256: b57d77bc4a3d2a11a40a78964141b2e778bdd701c80933ce4e86fbd99cabfb4e
vdsm-hook-localdisk-4.30.38-1.el7ev.noarch.rpm SHA-256: b48e03675291fb2428ced81c33ce72cc3cb0f40e9f368ca01704c7e8d69e18d9
vdsm-hook-localdisk-4.30.38-1.el7ev.noarch.rpm SHA-256: b48e03675291fb2428ced81c33ce72cc3cb0f40e9f368ca01704c7e8d69e18d9
vdsm-hook-macspoof-4.30.38-1.el7ev.noarch.rpm SHA-256: f899454a7e18dedffd543b6f474ba1ca69a9586f09c4d9f9eff5891c9897aef4
vdsm-hook-macspoof-4.30.38-1.el7ev.noarch.rpm SHA-256: f899454a7e18dedffd543b6f474ba1ca69a9586f09c4d9f9eff5891c9897aef4
vdsm-hook-nestedvt-4.30.38-1.el7ev.noarch.rpm SHA-256: b5a10ce936dd9630af7de73255d211997625464ba912001eb5c59895953ff18b
vdsm-hook-nestedvt-4.30.38-1.el7ev.noarch.rpm SHA-256: b5a10ce936dd9630af7de73255d211997625464ba912001eb5c59895953ff18b
vdsm-hook-openstacknet-4.30.38-1.el7ev.noarch.rpm SHA-256: e8006418c0a299f444d13f0f35ea24152f04df74a6b1764bad7014131a5ff335
vdsm-hook-openstacknet-4.30.38-1.el7ev.noarch.rpm SHA-256: e8006418c0a299f444d13f0f35ea24152f04df74a6b1764bad7014131a5ff335
vdsm-hook-vhostmd-4.30.38-1.el7ev.noarch.rpm SHA-256: 54da8dacaf166378c010d8307e884a9891f67ec23bf68318468e702c2613f7ed
vdsm-hook-vhostmd-4.30.38-1.el7ev.noarch.rpm SHA-256: 54da8dacaf166378c010d8307e884a9891f67ec23bf68318468e702c2613f7ed
vdsm-hook-vmfex-dev-4.30.38-1.el7ev.noarch.rpm SHA-256: baa28bd46d21476f93d1bb80bef8d248f430b5233419917682c640df4764657e
vdsm-hook-vmfex-dev-4.30.38-1.el7ev.noarch.rpm SHA-256: baa28bd46d21476f93d1bb80bef8d248f430b5233419917682c640df4764657e
vdsm-http-4.30.38-1.el7ev.noarch.rpm SHA-256: b7d8ad3c64bd1e5026029f173f87be16aeee7965f1e8c3826d510435ba2658f0
vdsm-http-4.30.38-1.el7ev.noarch.rpm SHA-256: b7d8ad3c64bd1e5026029f173f87be16aeee7965f1e8c3826d510435ba2658f0
vdsm-jsonrpc-4.30.38-1.el7ev.noarch.rpm SHA-256: 76f01afe5623812aa564678ca7acc6ce907e4585a2c8498369a9555c843a69b0
vdsm-jsonrpc-4.30.38-1.el7ev.noarch.rpm SHA-256: 76f01afe5623812aa564678ca7acc6ce907e4585a2c8498369a9555c843a69b0
vdsm-network-4.30.38-1.el7ev.ppc64le.rpm SHA-256: af6e812e7635552a2ea32004cdf0730704b4df3f9192fd4a80df6dcfff91772c
vdsm-network-4.30.38-1.el7ev.ppc64le.rpm SHA-256: af6e812e7635552a2ea32004cdf0730704b4df3f9192fd4a80df6dcfff91772c
vdsm-python-4.30.38-1.el7ev.noarch.rpm SHA-256: fa5b428836b4f99e53bc371c6976edc0b02e326072596b42b0648be964b4f077
vdsm-python-4.30.38-1.el7ev.noarch.rpm SHA-256: fa5b428836b4f99e53bc371c6976edc0b02e326072596b42b0648be964b4f077
vdsm-yajsonrpc-4.30.38-1.el7ev.noarch.rpm SHA-256: fdf3c80737326a902ef1f62b04a8e51eb18ebc9c0a29b6f51ec3e00252fc057e
vdsm-yajsonrpc-4.30.38-1.el7ev.noarch.rpm SHA-256: fdf3c80737326a902ef1f62b04a8e51eb18ebc9c0a29b6f51ec3e00252fc057e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility