- Issued:
- 2020-09-23
- Updated:
- 2020-09-23
RHBA-2020:3822 - Bug Fix Advisory
Synopsis
RHV RHEL Host (ovirt-host) 4.4.z [ovirt-4.4.2]
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated host packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts (RHVH) or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, the partition number was not removed from the disk path, so the disk mapping pointed to an arbitrary partition on the disk, instead of the disk itself. The current release fixes this issue: Disk mapping contains only disk paths. (BZ#1793290)
- Previously, virtual machine (VM) imports from sparse storage assumed the target also used sparse storage. However, block storage does not support sparse allocation. The current release fixes this issue: Imports to block storage for COW image file formats preserve sparse allocation types and work as expected. (BZ#1663135)
- Before this update, when you ran a VM that was previously powered off, the VDSM log contained many uninformative warnings. This update resolves the issue and these warnings no longer appear in the VDSM log. (BZ#1740058)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 8 x86_64
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 8 ppc64le
Fixes
- BZ - 1651772 - VDSM's multipath health check output is incorrect
- BZ - 1663135 - RFE: importing vm from KVM external provider should work also to block based SD
- BZ - 1670339 - HA VMs are started too early before the lease expire time and fails with error "Lease is held by another host"
- BZ - 1740058 - vdsm log contains warnings 'could not run <function <lambda> at 0x7fe0ec1db1b8>'
- BZ - 1793290 - guestDiskMapping can be missing or incorrect when retrieved from qga
- BZ - 1850267 - [Performance] VDSM creating or copying preallocated disks cause severe slowdowns on NFS < 4.2 storage domains
- BZ - 1860716 - VDSM Traceback failure at the journal log on DEBUG mode
- BZ - 1868321 - [clone] KeyError with vlanned bridgeless default route networks
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization 4 for RHEL 8
SRPM | |
---|---|
ovirt-hosted-engine-setup-2.4.6-1.el8ev.src.rpm | SHA-256: 7006b6bb4f53e79a607138ffa40db096faacb362d7eac9752014468835a5a1e4 |
vdsm-4.40.26-1.el8ev.src.rpm | SHA-256: 5979d3007b785e1f4645a370103ed8fb49565e4e9cc32dbd319aa5ef0458f349 |
x86_64 | |
ovirt-hosted-engine-setup-2.4.6-1.el8ev.noarch.rpm | SHA-256: 5b96a8fc5bfbb78b91d11627cdc54ac4e4af8a3a1dbd65f954cbef6e6194c1cd |
vdsm-4.40.26-1.el8ev.x86_64.rpm | SHA-256: e1db78941bc22d8dcafac929161afceb80cfdd1eb6a61f823309c485e05f17ad |
vdsm-api-4.40.26-1.el8ev.noarch.rpm | SHA-256: 658c012ed132562d56d53f2a52323e542e35474f4f1b820dc806fb02073dd87c |
vdsm-client-4.40.26-1.el8ev.noarch.rpm | SHA-256: fe139dd79ede5aa3aa860b60383533a06e2b5ee6f5374fcfd3c675642041bcae |
vdsm-common-4.40.26-1.el8ev.noarch.rpm | SHA-256: 7a5789f78604687e7970eed363758c30dc5e9c7aade59a46b0ac0446c4952127 |
vdsm-gluster-4.40.26-1.el8ev.x86_64.rpm | SHA-256: 7bdf685098d4e78c6f0574ee1d14ca3bf8b5080798080d1d09ed30c5af348d79 |
vdsm-hook-checkips-4.40.26-1.el8ev.x86_64.rpm | SHA-256: 04e7f34ec4ad03aeb8db393143f77b223682719b1b5604e7031970017d02a8d9 |
vdsm-hook-cpuflags-4.40.26-1.el8ev.noarch.rpm | SHA-256: 99cfd7b7395d54e6520454053edcef1f5663ac59286dff4443e9d71e50b4a8da |
vdsm-hook-ethtool-options-4.40.26-1.el8ev.noarch.rpm | SHA-256: 42b4cc559c5f1b0d34be472555f2cb532ac3f186f60838b477cfa8c32d9560c7 |
vdsm-hook-extra-ipv4-addrs-4.40.26-1.el8ev.x86_64.rpm | SHA-256: 172accf7442e1123925fca58e137fed3a64b2b037ce503a84cd1624949b6794f |
vdsm-hook-fcoe-4.40.26-1.el8ev.noarch.rpm | SHA-256: ccc8f369263642497b0f1dff5bf9815f80ec53e3510a03aced2d14321fb9e018 |
vdsm-hook-localdisk-4.40.26-1.el8ev.noarch.rpm | SHA-256: c770ec43d5fb9494c7638bb1eb80e61f08da2d58fdf63ef7578c8873bd49d1a1 |
vdsm-hook-nestedvt-4.40.26-1.el8ev.noarch.rpm | SHA-256: be52eec33c49ba274ad58a1d275eb3cc746ba51a1015161f73d5d578282ab7b8 |
vdsm-hook-openstacknet-4.40.26-1.el8ev.noarch.rpm | SHA-256: 2d2e90a92e8cdb2ad918cc2889668907cbc18746eb728e8721711e7cd5b38e47 |
vdsm-hook-vhostmd-4.40.26-1.el8ev.noarch.rpm | SHA-256: bdfffd4e71ec36a4348b856c90fe2e066dd26a3b40a2d145ee4bc6ff20db40a5 |
vdsm-hook-vmfex-dev-4.40.26-1.el8ev.noarch.rpm | SHA-256: 5f904cf33a8f6d3f25516d444658b3fc035a654e5cc03e856474e8cd2a01df2b |
vdsm-http-4.40.26-1.el8ev.noarch.rpm | SHA-256: a65aa1d5a63ddd776f3c4c977d8a92e3652ee69b42ed0b2b0a816d6f7e0c9dd9 |
vdsm-jsonrpc-4.40.26-1.el8ev.noarch.rpm | SHA-256: eae83fbd037c2848d0c52dd62d741091f6e1168afdb8b852e6f0d0f80370d2b1 |
vdsm-network-4.40.26-1.el8ev.x86_64.rpm | SHA-256: 2000e3ea76cd138d23608fc0a9109d6ec301c725e3aa7f39ba55f2b957d29a09 |
vdsm-python-4.40.26-1.el8ev.noarch.rpm | SHA-256: ec3ef938a81c712f90b9dd1de9e16a5a7f4509c001c002031dfbd29551fdcc3a |
vdsm-yajsonrpc-4.40.26-1.el8ev.noarch.rpm | SHA-256: 312e0ece0a8e6cc7d1d8649825273cb15d1869dd3000690f7fe04bb6dc74b45e |
Red Hat Virtualization Host 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.40.26-1.el8ev.src.rpm | SHA-256: 5979d3007b785e1f4645a370103ed8fb49565e4e9cc32dbd319aa5ef0458f349 |
x86_64 | |
vdsm-hook-nestedvt-4.40.26-1.el8ev.noarch.rpm | SHA-256: be52eec33c49ba274ad58a1d275eb3cc746ba51a1015161f73d5d578282ab7b8 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.40.26-1.el8ev.src.rpm | SHA-256: 5979d3007b785e1f4645a370103ed8fb49565e4e9cc32dbd319aa5ef0458f349 |
ppc64le | |
vdsm-4.40.26-1.el8ev.ppc64le.rpm | SHA-256: cd784342eb1784eedc76ccdafe644d6a0d421a6ad124fc2bd07f673f4280917e |
vdsm-api-4.40.26-1.el8ev.noarch.rpm | SHA-256: 658c012ed132562d56d53f2a52323e542e35474f4f1b820dc806fb02073dd87c |
vdsm-client-4.40.26-1.el8ev.noarch.rpm | SHA-256: fe139dd79ede5aa3aa860b60383533a06e2b5ee6f5374fcfd3c675642041bcae |
vdsm-common-4.40.26-1.el8ev.noarch.rpm | SHA-256: 7a5789f78604687e7970eed363758c30dc5e9c7aade59a46b0ac0446c4952127 |
vdsm-hook-checkips-4.40.26-1.el8ev.ppc64le.rpm | SHA-256: 6ed1a8b32c1ba1311acdac327181e86e81c5d58d7aad86196b7874fec7d32827 |
vdsm-hook-cpuflags-4.40.26-1.el8ev.noarch.rpm | SHA-256: 99cfd7b7395d54e6520454053edcef1f5663ac59286dff4443e9d71e50b4a8da |
vdsm-hook-ethtool-options-4.40.26-1.el8ev.noarch.rpm | SHA-256: 42b4cc559c5f1b0d34be472555f2cb532ac3f186f60838b477cfa8c32d9560c7 |
vdsm-hook-extra-ipv4-addrs-4.40.26-1.el8ev.ppc64le.rpm | SHA-256: f530264087312164960b708cf15a9c47c7700c17345f4d8f356919e6316f651b |
vdsm-hook-fcoe-4.40.26-1.el8ev.noarch.rpm | SHA-256: ccc8f369263642497b0f1dff5bf9815f80ec53e3510a03aced2d14321fb9e018 |
vdsm-hook-localdisk-4.40.26-1.el8ev.noarch.rpm | SHA-256: c770ec43d5fb9494c7638bb1eb80e61f08da2d58fdf63ef7578c8873bd49d1a1 |
vdsm-hook-nestedvt-4.40.26-1.el8ev.noarch.rpm | SHA-256: be52eec33c49ba274ad58a1d275eb3cc746ba51a1015161f73d5d578282ab7b8 |
vdsm-hook-openstacknet-4.40.26-1.el8ev.noarch.rpm | SHA-256: 2d2e90a92e8cdb2ad918cc2889668907cbc18746eb728e8721711e7cd5b38e47 |
vdsm-hook-vhostmd-4.40.26-1.el8ev.noarch.rpm | SHA-256: bdfffd4e71ec36a4348b856c90fe2e066dd26a3b40a2d145ee4bc6ff20db40a5 |
vdsm-hook-vmfex-dev-4.40.26-1.el8ev.noarch.rpm | SHA-256: 5f904cf33a8f6d3f25516d444658b3fc035a654e5cc03e856474e8cd2a01df2b |
vdsm-http-4.40.26-1.el8ev.noarch.rpm | SHA-256: a65aa1d5a63ddd776f3c4c977d8a92e3652ee69b42ed0b2b0a816d6f7e0c9dd9 |
vdsm-jsonrpc-4.40.26-1.el8ev.noarch.rpm | SHA-256: eae83fbd037c2848d0c52dd62d741091f6e1168afdb8b852e6f0d0f80370d2b1 |
vdsm-network-4.40.26-1.el8ev.ppc64le.rpm | SHA-256: a948f33deafece7a5fe9398e2bc5f97516d088b1bde6c5a7278b9ef0f1b21084 |
vdsm-python-4.40.26-1.el8ev.noarch.rpm | SHA-256: ec3ef938a81c712f90b9dd1de9e16a5a7f4509c001c002031dfbd29551fdcc3a |
vdsm-yajsonrpc-4.40.26-1.el8ev.noarch.rpm | SHA-256: 312e0ece0a8e6cc7d1d8649825273cb15d1869dd3000690f7fe04bb6dc74b45e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.