Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2020:4113 - Bug Fix Advisory
Issued:
2020-09-30
Updated:
2020-09-30

RHBA-2020:4113 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat Virtualization RHEL Host (ovirt-host) 4.3.11

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated host packages that fix several bugs and add various enhancements are now available.

Description

The ovirt-hosted-engine-setup package provides a self-hosted engine tool for the Red Hat Virtualization Manager. A self-hosted engine is a virtualized environment in which the Manager runs on a virtual machine on the hosts managed by the Manager.

v2v-conversion-host is an Ansible role and daemonizing virt-v2v wrapper that turns a Red Hat Virtualization host into a conversion host for CloudForms migration.

VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts (RHVH) or Red Hat Enterprise Linux hosts.

Changes to the ovirt-hosted-engine-setup component:

  • Require ansible-2.9.13, which was tested with ovirt-hosted-engine-setup included in RHV 4.3.11 (BZ#1873055)

Changes to the v2v-conversion-host component:

  • After updating the packages on a conversion host, it stopped displaying conversion progress. The current release fixes this issue. The conversion host reports its progress performing conversions, including on the latest RHEL 7-based hosts. (BZ#1855213)

Changes to the vdsm component:

  • Host capabilities retrieval was failing for certain non-NUMA CPU topologies. That has been fixed and host capabilities should be correctly reported now for those topologies. (BZ#1852315)
  • Previously, the `slot` parameter was parsed as a string, causing disk rollback to fail during the creation of a virtual machine from a template when using an Ansible script. Note that there was no such failure when using the Administration Portal to create a virtual machine from a template.

With this update, the `slot` parameter is parsed as an int, so disk rollback and virtual machine creation succeed. (BZ#1851854)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le

Fixes

  • BZ - 1851854 - Failed to create VM from template in CreateVolumeContainerCommand when stopping VDSM service in a single host environment [RHV clone - 4.3.11]
  • BZ - 1852315 - cpu_topology.online_cpus returns integers instead of string causing host failures [RHV clone - 4.3.11]
  • BZ - 1852344 - [Scale] Using --select for lvm cache reloads induces transient VG metadata corruption
  • BZ - 1855213 - Skipping progress update for unknown disk
  • BZ - 1856952 - [Rebase] Rebase v2v-conversion-host to 1.16.2 for RHV 4.3
  • BZ - 1873055 - Require tested ansible-2.9.13 for ovirt-hosted-engine-setup in RHV Manager 4.3.11

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
ovirt-hosted-engine-setup-2.3.13-2.el7ev.src.rpm SHA-256: a5d43a73afe760631236c12a1067eb0f346b29fdb726712f828a6bae0943495a
v2v-conversion-host-1.16.2-2.el7ev.src.rpm SHA-256: 41c294b2260b90509719c70d37b1cc24e6ea681b109315b2b079fba80c457d1e
vdsm-4.30.50-1.el7ev.src.rpm SHA-256: 39927ee06b488c17b3cbb22306569fd31bc3e0cb292babbf46a9a428bc2e8d14
x86_64
ovirt-hosted-engine-setup-2.3.13-2.el7ev.noarch.rpm SHA-256: 2c60e4bfdcc4a25d092cbf1dac2b19342fbbd139a7bb04d4affe99ba33c54fe8
v2v-conversion-host-wrapper-1.16.2-2.el7ev.noarch.rpm SHA-256: 55f92870017ba4149532aac118b14ee814e99a051596f452a059df7095095c5d
vdsm-4.30.50-1.el7ev.x86_64.rpm SHA-256: 663b06d77834802998631c4d33c19649b16d30affc02710c9090e115c3e804fa
vdsm-api-4.30.50-1.el7ev.noarch.rpm SHA-256: 5b4778242b56993ab3a6f0d7e566900dd9945066010b7d4b8ae6ae9dcda97a42
vdsm-client-4.30.50-1.el7ev.noarch.rpm SHA-256: 137ef0dcd7dd357bdc398eb28d21e575459fc0b08c422bbda5e15a81f64bd982
vdsm-common-4.30.50-1.el7ev.noarch.rpm SHA-256: 41f7f1e627d5a9d7772d4aa2a1cc5737eaaee60bed506a8849482634e77dad57
vdsm-gluster-4.30.50-1.el7ev.x86_64.rpm SHA-256: f6cea4d1f4ab326ffa67e3c2e6286b2abc39de52f497238bb3be7c108f116e32
vdsm-hook-checkips-4.30.50-1.el7ev.x86_64.rpm SHA-256: 9791a86dba2d52ec9c9fe8a394f26a6c84c1b44eb246f03ca9dcae3a3a6d70af
vdsm-hook-cpuflags-4.30.50-1.el7ev.noarch.rpm SHA-256: 27e1082ebf7b82a4feae6e56ddb917f36d2774dfb3669cdad158b3a5a22e8514
vdsm-hook-ethtool-options-4.30.50-1.el7ev.noarch.rpm SHA-256: 77629830d50b8a4170f326fdc5aeeae9eabaf912f7c3ab6de3a425e2f3797136
vdsm-hook-extra-ipv4-addrs-4.30.50-1.el7ev.x86_64.rpm SHA-256: 6c05653850a938129b20fc296c8fdb3a1475d798e8f2c148cac2f379c45022c3
vdsm-hook-fcoe-4.30.50-1.el7ev.noarch.rpm SHA-256: ec08872c076463bf7575ccb2da8394180d1170494f4829095a7d641874ce0f40
vdsm-hook-localdisk-4.30.50-1.el7ev.noarch.rpm SHA-256: 88badd03fff221fa387a98402ccc3c0f6386a514ea60f46de46f41cf9af1efcf
vdsm-hook-macspoof-4.30.50-1.el7ev.noarch.rpm SHA-256: 5b4366982d979fa904519bb839fab1bf07bf5e01200591df676ee12ef0a3e612
vdsm-hook-nestedvt-4.30.50-1.el7ev.noarch.rpm SHA-256: 141aee4c85003d647999872b5097c1f134684d418ddcbab985d70e6d6c1659f1
vdsm-hook-openstacknet-4.30.50-1.el7ev.noarch.rpm SHA-256: ca44bec7bba8a7edfbace5093976b015262b48926e088f3d3bb91e43e9ce1855
vdsm-hook-vhostmd-4.30.50-1.el7ev.noarch.rpm SHA-256: ccdd9709088eee16d83f1ba5672c036619c1b74bb95bc1db2504df1d373be075
vdsm-hook-vmfex-dev-4.30.50-1.el7ev.noarch.rpm SHA-256: 3f6e713efde1e54da4fb9e5df3a8cefc5dcfc5bdb88403c95a2e0f514786bef6
vdsm-http-4.30.50-1.el7ev.noarch.rpm SHA-256: d0b8857b3fdfc34fc308af8430a78f6dd3730ffb9e88bdf286e7f7d625a82f60
vdsm-jsonrpc-4.30.50-1.el7ev.noarch.rpm SHA-256: 51e9406561bf67d8b5414ca77a6c0ebcd228fc2c02cb915e27498b7de17dc38e
vdsm-network-4.30.50-1.el7ev.x86_64.rpm SHA-256: a014541a53754f14334b1a33be73fd55e0c9e770419a795a1a8b516639ee131d
vdsm-python-4.30.50-1.el7ev.noarch.rpm SHA-256: 419d2ebed4ae9aa66d07a1d6002c9315e24b84f25f06d43882a87c4195489def
vdsm-yajsonrpc-4.30.50-1.el7ev.noarch.rpm SHA-256: 6ef9b795994f1ecca5b2031d6a65ed3941b9e0b2dec53f0f8a06686db963cf99

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
vdsm-4.30.50-1.el7ev.src.rpm SHA-256: 39927ee06b488c17b3cbb22306569fd31bc3e0cb292babbf46a9a428bc2e8d14
ppc64le
vdsm-4.30.50-1.el7ev.ppc64le.rpm SHA-256: 7c514be2bfed6e2806a13436dea1bd7277700b6b3fc857c74dedf4c6b867ea6a
vdsm-4.30.50-1.el7ev.ppc64le.rpm SHA-256: 7c514be2bfed6e2806a13436dea1bd7277700b6b3fc857c74dedf4c6b867ea6a
vdsm-api-4.30.50-1.el7ev.noarch.rpm SHA-256: 5b4778242b56993ab3a6f0d7e566900dd9945066010b7d4b8ae6ae9dcda97a42
vdsm-api-4.30.50-1.el7ev.noarch.rpm SHA-256: 5b4778242b56993ab3a6f0d7e566900dd9945066010b7d4b8ae6ae9dcda97a42
vdsm-client-4.30.50-1.el7ev.noarch.rpm SHA-256: 137ef0dcd7dd357bdc398eb28d21e575459fc0b08c422bbda5e15a81f64bd982
vdsm-client-4.30.50-1.el7ev.noarch.rpm SHA-256: 137ef0dcd7dd357bdc398eb28d21e575459fc0b08c422bbda5e15a81f64bd982
vdsm-common-4.30.50-1.el7ev.noarch.rpm SHA-256: 41f7f1e627d5a9d7772d4aa2a1cc5737eaaee60bed506a8849482634e77dad57
vdsm-common-4.30.50-1.el7ev.noarch.rpm SHA-256: 41f7f1e627d5a9d7772d4aa2a1cc5737eaaee60bed506a8849482634e77dad57
vdsm-gluster-4.30.50-1.el7ev.ppc64le.rpm SHA-256: eb0cdabdfb1cdd1e1a8e51bcc85533f9d58eaa2376c05bf09c4bc56cd1e04d51
vdsm-gluster-4.30.50-1.el7ev.ppc64le.rpm SHA-256: eb0cdabdfb1cdd1e1a8e51bcc85533f9d58eaa2376c05bf09c4bc56cd1e04d51
vdsm-hook-checkips-4.30.50-1.el7ev.ppc64le.rpm SHA-256: ad0d1a1791188160ab54532eb05c85a0ae1df58877130e75b88f43be12c76ca8
vdsm-hook-checkips-4.30.50-1.el7ev.ppc64le.rpm SHA-256: ad0d1a1791188160ab54532eb05c85a0ae1df58877130e75b88f43be12c76ca8
vdsm-hook-cpuflags-4.30.50-1.el7ev.noarch.rpm SHA-256: 27e1082ebf7b82a4feae6e56ddb917f36d2774dfb3669cdad158b3a5a22e8514
vdsm-hook-cpuflags-4.30.50-1.el7ev.noarch.rpm SHA-256: 27e1082ebf7b82a4feae6e56ddb917f36d2774dfb3669cdad158b3a5a22e8514
vdsm-hook-ethtool-options-4.30.50-1.el7ev.noarch.rpm SHA-256: 77629830d50b8a4170f326fdc5aeeae9eabaf912f7c3ab6de3a425e2f3797136
vdsm-hook-ethtool-options-4.30.50-1.el7ev.noarch.rpm SHA-256: 77629830d50b8a4170f326fdc5aeeae9eabaf912f7c3ab6de3a425e2f3797136
vdsm-hook-extra-ipv4-addrs-4.30.50-1.el7ev.ppc64le.rpm SHA-256: 2a5894e00ea1c055bac5c6f7b26c83bbf449c8e975a2ad4e2a68abb2da4a88d8
vdsm-hook-extra-ipv4-addrs-4.30.50-1.el7ev.ppc64le.rpm SHA-256: 2a5894e00ea1c055bac5c6f7b26c83bbf449c8e975a2ad4e2a68abb2da4a88d8
vdsm-hook-fcoe-4.30.50-1.el7ev.noarch.rpm SHA-256: ec08872c076463bf7575ccb2da8394180d1170494f4829095a7d641874ce0f40
vdsm-hook-fcoe-4.30.50-1.el7ev.noarch.rpm SHA-256: ec08872c076463bf7575ccb2da8394180d1170494f4829095a7d641874ce0f40
vdsm-hook-localdisk-4.30.50-1.el7ev.noarch.rpm SHA-256: 88badd03fff221fa387a98402ccc3c0f6386a514ea60f46de46f41cf9af1efcf
vdsm-hook-localdisk-4.30.50-1.el7ev.noarch.rpm SHA-256: 88badd03fff221fa387a98402ccc3c0f6386a514ea60f46de46f41cf9af1efcf
vdsm-hook-macspoof-4.30.50-1.el7ev.noarch.rpm SHA-256: 5b4366982d979fa904519bb839fab1bf07bf5e01200591df676ee12ef0a3e612
vdsm-hook-macspoof-4.30.50-1.el7ev.noarch.rpm SHA-256: 5b4366982d979fa904519bb839fab1bf07bf5e01200591df676ee12ef0a3e612
vdsm-hook-nestedvt-4.30.50-1.el7ev.noarch.rpm SHA-256: 141aee4c85003d647999872b5097c1f134684d418ddcbab985d70e6d6c1659f1
vdsm-hook-nestedvt-4.30.50-1.el7ev.noarch.rpm SHA-256: 141aee4c85003d647999872b5097c1f134684d418ddcbab985d70e6d6c1659f1
vdsm-hook-openstacknet-4.30.50-1.el7ev.noarch.rpm SHA-256: ca44bec7bba8a7edfbace5093976b015262b48926e088f3d3bb91e43e9ce1855
vdsm-hook-openstacknet-4.30.50-1.el7ev.noarch.rpm SHA-256: ca44bec7bba8a7edfbace5093976b015262b48926e088f3d3bb91e43e9ce1855
vdsm-hook-vhostmd-4.30.50-1.el7ev.noarch.rpm SHA-256: ccdd9709088eee16d83f1ba5672c036619c1b74bb95bc1db2504df1d373be075
vdsm-hook-vhostmd-4.30.50-1.el7ev.noarch.rpm SHA-256: ccdd9709088eee16d83f1ba5672c036619c1b74bb95bc1db2504df1d373be075
vdsm-hook-vmfex-dev-4.30.50-1.el7ev.noarch.rpm SHA-256: 3f6e713efde1e54da4fb9e5df3a8cefc5dcfc5bdb88403c95a2e0f514786bef6
vdsm-hook-vmfex-dev-4.30.50-1.el7ev.noarch.rpm SHA-256: 3f6e713efde1e54da4fb9e5df3a8cefc5dcfc5bdb88403c95a2e0f514786bef6
vdsm-http-4.30.50-1.el7ev.noarch.rpm SHA-256: d0b8857b3fdfc34fc308af8430a78f6dd3730ffb9e88bdf286e7f7d625a82f60
vdsm-http-4.30.50-1.el7ev.noarch.rpm SHA-256: d0b8857b3fdfc34fc308af8430a78f6dd3730ffb9e88bdf286e7f7d625a82f60
vdsm-jsonrpc-4.30.50-1.el7ev.noarch.rpm SHA-256: 51e9406561bf67d8b5414ca77a6c0ebcd228fc2c02cb915e27498b7de17dc38e
vdsm-jsonrpc-4.30.50-1.el7ev.noarch.rpm SHA-256: 51e9406561bf67d8b5414ca77a6c0ebcd228fc2c02cb915e27498b7de17dc38e
vdsm-network-4.30.50-1.el7ev.ppc64le.rpm SHA-256: 01433ecae4e76a5e58c4baabee169a78c79b7d29a1fab3d8bb514d0b23b08c4e
vdsm-network-4.30.50-1.el7ev.ppc64le.rpm SHA-256: 01433ecae4e76a5e58c4baabee169a78c79b7d29a1fab3d8bb514d0b23b08c4e
vdsm-python-4.30.50-1.el7ev.noarch.rpm SHA-256: 419d2ebed4ae9aa66d07a1d6002c9315e24b84f25f06d43882a87c4195489def
vdsm-python-4.30.50-1.el7ev.noarch.rpm SHA-256: 419d2ebed4ae9aa66d07a1d6002c9315e24b84f25f06d43882a87c4195489def
vdsm-yajsonrpc-4.30.50-1.el7ev.noarch.rpm SHA-256: 6ef9b795994f1ecca5b2031d6a65ed3941b9e0b2dec53f0f8a06686db963cf99
vdsm-yajsonrpc-4.30.50-1.el7ev.noarch.rpm SHA-256: 6ef9b795994f1ecca5b2031d6a65ed3941b9e0b2dec53f0f8a06686db963cf99

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility