- Issued:
- 2021-07-22
- Updated:
- 2021-07-22
RHBA-2021:2864 - Bug Fix Advisory
Synopsis
RHV RHEL Host (ovirt-host) [ovirt-4.4.7]
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated host packages that fix several bugs and add various enhancements are now available.
Description
The ovirt-host package consolidates host package requirements into a single meta package.
Changes to the ovirt-host component:
- The ovirt-host package no longer pulls in vdsm-hooks automatically.
To use vdsm hooks, you must install the appropriate hook for the specific functionality required. (BZ#1947450)
Changes to the ovirt-hosted-engine-setup component:
- One of the steps during hosted-engine deployment is "Activate Storage Domain". Normally, this step returns the amount of available space in the domain. Under certain conditions, this information is missing.
In previous releases, if the available space was missing, deployment failed. With this release, deployment will provide an error message and allow you to provide the details needed for creating a storage domain.
This issue appears to affect deployments using '--restore-from-file', when the existing setup has problematic block storage (iSCSI or Fiber Channel). If this happens, it is recommended that you connect to the Administration Portal and clear all storage-related issues before continuing. (BZ#1662657)
- The ovirt-hosted-engine-setup in RHV 4.4.7 requires Ansible 2.9.21 or higher. Also in RHV 4.4.7, the specific Ansible version has been removed, because the correct Ansible version is shipped through RHV channels. (BZ#1966150)
Changes to the vdsm component:
- Previously, when two threads in a VDSM attempted to release a storage lease at the same time, sanlock would incorrectly close the socket to VDSM and release the leases owned by VDSM.
In this Release, VDSM serializes calls to sanlock_release() so that if multiple threads attempt to release a lease at the same time, the calls will run sequentially. (BZ#1952345)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 8 x86_64
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 8 ppc64le
Fixes
- BZ - 1662657 - Restore SHE environment on iscsi fails - KeyError: 'available'
- BZ - 1870887 - StorageDomain.dump() missing several keys for volume if one key is missing.
- BZ - 1883399 - During migration, late volume extension request on src is possibly not refreshed on dst, qcow2 corrupt bit set
- BZ - 1899875 - drop support for VM-FEX
- BZ - 1936298 - New guest tools available mark even when latest guest tools are installed.
- BZ - 1947450 - ovirt-host shouldn't have hard dependency on vdsm hooks
- BZ - 1949059 - Reducing LUNs from storage domain is failing with error "LVM command executed by lvmpolld failed"
- BZ - 1957776 - Merge operation fails after live storage migration.
- BZ - 1964261 - [RFE] [SR-IOV] [RHV 4.4.7] Migration should not require downtime as of today
- BZ - 1966150 - Remove version lock on specific ansible version and require ansible 2.9.z >= 2.9.21 in ovirt-hosted-engine-setup
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 8
SRPM | |
---|---|
ovirt-host-4.4.7-1.el8ev.src.rpm | SHA-256: 0c42909c5747e2029ba3f87d6e448408d7a4bd81d7ed68bacd941fabbb7be441 |
ovirt-hosted-engine-setup-2.5.1-1.el8ev.src.rpm | SHA-256: 667ee51979be76c33702327f70cc2694abc847ae64115eccd81fe4490cb7dfaf |
vdsm-4.40.70.6-1.el8ev.src.rpm | SHA-256: 582ccbed1e391addb3d7581f430d730c45383748bddfe3a5c8442c5106915063 |
x86_64 | |
ovirt-host-4.4.7-1.el8ev.x86_64.rpm | SHA-256: b936380f044cb075fd7035a2e599c27e704d8e38f73a5796d01a176a0310530d |
ovirt-host-dependencies-4.4.7-1.el8ev.x86_64.rpm | SHA-256: 095e22c353a98086acb0a7ec22188bce1758f08c8f10536dbce738d32dee1025 |
ovirt-hosted-engine-setup-2.5.1-1.el8ev.noarch.rpm | SHA-256: 545907c2589793e890b2d0d8c4e4486e6ffd4cc120f4338ea5a26ce45eaf11ef |
vdsm-4.40.70.6-1.el8ev.x86_64.rpm | SHA-256: d792b4879aa16b08e739e138ae8e57b09667e02fb59f35cc09cd2283d4ce456b |
vdsm-api-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: d9b2bf7b655ee6c1e826af1ef8e8e16c284265a6c411faaf63c78718e2aec398 |
vdsm-client-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: b00b4f73f7e09fe4845866d429c8577b996574d9881e453f2f51489dfa97d3fc |
vdsm-common-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: f3f7de88496c5067feadcb1383744a811bb95977ca71192c8722a70131a2cab2 |
vdsm-gluster-4.40.70.6-1.el8ev.x86_64.rpm | SHA-256: 6733b5ccd088f3ab983e87bc64212ef17bd9d1079897dac2e8bb27fefe6c626f |
vdsm-hook-checkips-4.40.70.6-1.el8ev.x86_64.rpm | SHA-256: 11ed39e4d2e4fdf1eefb3ee999d2af6a6687e61bc2b39e3d6c265c4cdc6ded0a |
vdsm-hook-cpuflags-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6e5f0883804dedab9ab2bb389249275bf9f2daeba67b7208c5529d16b814497c |
vdsm-hook-ethtool-options-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 00d72eafa03270a8ad80ac75fa580951a913ddbfd819f6f442120cc463d72f82 |
vdsm-hook-extra-ipv4-addrs-4.40.70.6-1.el8ev.x86_64.rpm | SHA-256: c44e94c14266d4c92975515c8143e3b5ae0037a2a5ac4161dce0ba29d2c97367 |
vdsm-hook-fcoe-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 81f3bf256809aa61e22476fdd873fd8fa169bfba7a630e721ae24bc0e63163a0 |
vdsm-hook-localdisk-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6fa34460b3377a5d8652fdb9b19879b2ce041d4579b44dd064b2812111b541dd |
vdsm-hook-nestedvt-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 751e4abb535e6a82e8b23fa97c5135120d6e236e9551b66436bc62216b76b19f |
vdsm-hook-openstacknet-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 127729f92607d0379502b23c27f6713743211f9b4287e2c2f9d5f289ffa689d9 |
vdsm-hook-vhostmd-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 83022e83a9d512e7efc4bd1a405fe3a306eecc69517ad159542cea6f33a5b9a2 |
vdsm-http-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 3d9484ef2a281e745f084d1dae421181b113c96207277c93e55b0f6d394995e2 |
vdsm-jsonrpc-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6b7ed442a04a2646be3e9363278b5ec3dc450866226100063f16a48a2d053620 |
vdsm-network-4.40.70.6-1.el8ev.x86_64.rpm | SHA-256: 7f65f20e06aaa8420ace6a909f22146fca5b7ebb5a9114b240151677f3a268e6 |
vdsm-python-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: ab9755be2912df41259b27100644f47220d3eb36cc729c6df78b67c9545d0217 |
vdsm-yajsonrpc-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 4d7b58b3be72d487b94ffcc9a02cf79b7d3caaf2e868502c409064d9b2a7752b |
Red Hat Virtualization Host 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.40.70.6-1.el8ev.src.rpm | SHA-256: 582ccbed1e391addb3d7581f430d730c45383748bddfe3a5c8442c5106915063 |
x86_64 | |
vdsm-hook-checkips-4.40.70.6-1.el8ev.x86_64.rpm | SHA-256: 11ed39e4d2e4fdf1eefb3ee999d2af6a6687e61bc2b39e3d6c265c4cdc6ded0a |
vdsm-hook-cpuflags-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6e5f0883804dedab9ab2bb389249275bf9f2daeba67b7208c5529d16b814497c |
vdsm-hook-ethtool-options-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 00d72eafa03270a8ad80ac75fa580951a913ddbfd819f6f442120cc463d72f82 |
vdsm-hook-extra-ipv4-addrs-4.40.70.6-1.el8ev.x86_64.rpm | SHA-256: c44e94c14266d4c92975515c8143e3b5ae0037a2a5ac4161dce0ba29d2c97367 |
vdsm-hook-fcoe-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 81f3bf256809aa61e22476fdd873fd8fa169bfba7a630e721ae24bc0e63163a0 |
vdsm-hook-localdisk-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6fa34460b3377a5d8652fdb9b19879b2ce041d4579b44dd064b2812111b541dd |
vdsm-hook-nestedvt-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 751e4abb535e6a82e8b23fa97c5135120d6e236e9551b66436bc62216b76b19f |
vdsm-hook-openstacknet-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 127729f92607d0379502b23c27f6713743211f9b4287e2c2f9d5f289ffa689d9 |
vdsm-hook-vhostmd-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 83022e83a9d512e7efc4bd1a405fe3a306eecc69517ad159542cea6f33a5b9a2 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 8
SRPM | |
---|---|
ovirt-host-4.4.7-1.el8ev.src.rpm | SHA-256: 0c42909c5747e2029ba3f87d6e448408d7a4bd81d7ed68bacd941fabbb7be441 |
vdsm-4.40.70.6-1.el8ev.src.rpm | SHA-256: 582ccbed1e391addb3d7581f430d730c45383748bddfe3a5c8442c5106915063 |
ppc64le | |
ovirt-host-4.4.7-1.el8ev.ppc64le.rpm | SHA-256: 422b3b8556ed7e4a27c45a1696b08af2dbad92b87524116e2b91952c305a2ff4 |
ovirt-host-dependencies-4.4.7-1.el8ev.ppc64le.rpm | SHA-256: 931eb045a3d7b11b4d3867dc3689db00671b5840f5e32e4372558a588c059c67 |
vdsm-4.40.70.6-1.el8ev.ppc64le.rpm | SHA-256: ae6513b326ffc013d36bf9e03ad5fec3c9264fff5c9ffef8b38a87d129a66b68 |
vdsm-api-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: d9b2bf7b655ee6c1e826af1ef8e8e16c284265a6c411faaf63c78718e2aec398 |
vdsm-client-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: b00b4f73f7e09fe4845866d429c8577b996574d9881e453f2f51489dfa97d3fc |
vdsm-common-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: f3f7de88496c5067feadcb1383744a811bb95977ca71192c8722a70131a2cab2 |
vdsm-hook-checkips-4.40.70.6-1.el8ev.ppc64le.rpm | SHA-256: 6263177a75f10b95f123f048efebcde4ec7aa9ff35767b0cf7c7af0d1df9f362 |
vdsm-hook-cpuflags-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6e5f0883804dedab9ab2bb389249275bf9f2daeba67b7208c5529d16b814497c |
vdsm-hook-ethtool-options-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 00d72eafa03270a8ad80ac75fa580951a913ddbfd819f6f442120cc463d72f82 |
vdsm-hook-extra-ipv4-addrs-4.40.70.6-1.el8ev.ppc64le.rpm | SHA-256: f48930df7f146709936763198cc567f650188b16b68208270857ace621d6a555 |
vdsm-hook-fcoe-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 81f3bf256809aa61e22476fdd873fd8fa169bfba7a630e721ae24bc0e63163a0 |
vdsm-hook-localdisk-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6fa34460b3377a5d8652fdb9b19879b2ce041d4579b44dd064b2812111b541dd |
vdsm-hook-nestedvt-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 751e4abb535e6a82e8b23fa97c5135120d6e236e9551b66436bc62216b76b19f |
vdsm-hook-openstacknet-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 127729f92607d0379502b23c27f6713743211f9b4287e2c2f9d5f289ffa689d9 |
vdsm-hook-vhostmd-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 83022e83a9d512e7efc4bd1a405fe3a306eecc69517ad159542cea6f33a5b9a2 |
vdsm-http-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 3d9484ef2a281e745f084d1dae421181b113c96207277c93e55b0f6d394995e2 |
vdsm-jsonrpc-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 6b7ed442a04a2646be3e9363278b5ec3dc450866226100063f16a48a2d053620 |
vdsm-network-4.40.70.6-1.el8ev.ppc64le.rpm | SHA-256: 1faf4cc6ca247b29351b0f4025755ef438550e83e5a31e083506919fffc771ef |
vdsm-python-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: ab9755be2912df41259b27100644f47220d3eb36cc729c6df78b67c9545d0217 |
vdsm-yajsonrpc-4.40.70.6-1.el8ev.noarch.rpm | SHA-256: 4d7b58b3be72d487b94ffcc9a02cf79b7d3caaf2e868502c409064d9b2a7752b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.