- Issued:
- 2022-01-12
- Updated:
- 2022-01-12
RHBA-2022:0134 - Bug Fix Advisory
Synopsis
RHV RHEL Host (ovirt-host) [ovirt-4.4.9] ASYNC #2
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated host packages that fix several bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Hosts (RHVH) or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, in some cases of importing a virtual machine, the VDSM logs were filled with repeated errors regarding a missing attribute. As a result, although the import process succeeded, the virtual machine sometimes remained locked, and the debug process was difficult due to the repeated errors in the VDSM log.
In this release, the import process succeeds, the resulting virtual machine remains unlocked, and the VDSM log is not filled with the missing attribute error. (BZ#2037739)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 8 x86_64
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 8 ppc64le
Fixes
- BZ - 2037739 - VM remains locked after importing from vmware/external-ova, we see "'str' object has no attribute 'decode'" in the log
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 8
| SRPM | |
|---|---|
| vdsm-4.40.90.5-1.el8ev.src.rpm | SHA-256: 01bd01114ad3d16e7254000067af540a60196824c5a498a11663d5688dd56879 |
| x86_64 | |
| vdsm-4.40.90.5-1.el8ev.x86_64.rpm | SHA-256: 4ebeeb7ba8c3e4424ad553b0c527462282c0c23eb379ca292c014ca455e792c4 |
| vdsm-api-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: ffe16b5873af8764fa379a86e2ad720f3d8c59af6aaff0477fe0a81db5d211d7 |
| vdsm-client-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: c4cf7e79a930cb05f251e421fa4128a158f5010420981fea96937a920819e5ae |
| vdsm-common-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 33e39b4d71d37b1221e0f599f1b32fcf6a35f4f3356595eaf3bc4c7a4683bb2c |
| vdsm-gluster-4.40.90.5-1.el8ev.x86_64.rpm | SHA-256: c3dedf4e4455541b4107469cc1126cd0a4e84980fe99ae1954b1112155e252af |
| vdsm-hook-checkips-4.40.90.5-1.el8ev.x86_64.rpm | SHA-256: 72849a766d44d99d6e100abe1bbfbe509d074e7cc71530d4fe740280ca36a03d |
| vdsm-hook-cpuflags-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 5d24bb0b371c9a651bb78610910d757c5e9d3b69274698d1ecbf5d21169f67b3 |
| vdsm-hook-ethtool-options-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: d275e8a79cc0ecf76c0c9363bbab873636fe84573d3f68a904cfe85358236a01 |
| vdsm-hook-extra-ipv4-addrs-4.40.90.5-1.el8ev.x86_64.rpm | SHA-256: 5a82fcad240f7d4182eb7a1fbf6a84a733defdb5b8ede8c2e974ad8865a9e348 |
| vdsm-hook-fcoe-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 8006896cc1495d031f0d0252e4dbaf05b41b1640c171a3b61ab1bb34725837b1 |
| vdsm-hook-localdisk-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: a79db6f07098f073d0b33d683a44d95e9ff1a01db01c17859afee2131f3cce39 |
| vdsm-hook-nestedvt-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 45a4967c5c893afb08f8e7fa5266b5904178ca4f3a93dd59cf05823451b22f4e |
| vdsm-hook-openstacknet-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 076c9cfa5d515d9c348cddc775586a0040d27446218bbb670d2879ce32324a8f |
| vdsm-hook-vhostmd-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: ce949c6ccdd3c363434e5fafc6108409c46e9dfecec204b0ff3969333c2775df |
| vdsm-http-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: d75ad62a68d407fe31b4caf86ac20763eb71e5ab4fa72defc1bf3560c0640b3e |
| vdsm-jsonrpc-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: c55c8b365a35e040313ff6bca39d2e907129a5dc41951abe6380f270562e7fc3 |
| vdsm-network-4.40.90.5-1.el8ev.x86_64.rpm | SHA-256: 85b8e27b191dc632618d33ba69a3ae31d4df6d36746dc14b51c231d643c62ed2 |
| vdsm-python-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 9e55fa02cf5cbcf7a027232a606c9bffbc9d81771f9a391c8f2589db23662a6a |
| vdsm-yajsonrpc-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: faec23ac6ca766042bdc204801025fb11724bfe9f3b1cd3e335719a3f42570bf |
Red Hat Virtualization Host 4 for RHEL 8
| SRPM | |
|---|---|
| vdsm-4.40.90.5-1.el8ev.src.rpm | SHA-256: 01bd01114ad3d16e7254000067af540a60196824c5a498a11663d5688dd56879 |
| x86_64 | |
| vdsm-hook-checkips-4.40.90.5-1.el8ev.x86_64.rpm | SHA-256: 72849a766d44d99d6e100abe1bbfbe509d074e7cc71530d4fe740280ca36a03d |
| vdsm-hook-cpuflags-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 5d24bb0b371c9a651bb78610910d757c5e9d3b69274698d1ecbf5d21169f67b3 |
| vdsm-hook-ethtool-options-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: d275e8a79cc0ecf76c0c9363bbab873636fe84573d3f68a904cfe85358236a01 |
| vdsm-hook-extra-ipv4-addrs-4.40.90.5-1.el8ev.x86_64.rpm | SHA-256: 5a82fcad240f7d4182eb7a1fbf6a84a733defdb5b8ede8c2e974ad8865a9e348 |
| vdsm-hook-fcoe-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 8006896cc1495d031f0d0252e4dbaf05b41b1640c171a3b61ab1bb34725837b1 |
| vdsm-hook-localdisk-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: a79db6f07098f073d0b33d683a44d95e9ff1a01db01c17859afee2131f3cce39 |
| vdsm-hook-nestedvt-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 45a4967c5c893afb08f8e7fa5266b5904178ca4f3a93dd59cf05823451b22f4e |
| vdsm-hook-openstacknet-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 076c9cfa5d515d9c348cddc775586a0040d27446218bbb670d2879ce32324a8f |
| vdsm-hook-vhostmd-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: ce949c6ccdd3c363434e5fafc6108409c46e9dfecec204b0ff3969333c2775df |
Red Hat Virtualization for IBM Power LE 4 for RHEL 8
| SRPM | |
|---|---|
| vdsm-4.40.90.5-1.el8ev.src.rpm | SHA-256: 01bd01114ad3d16e7254000067af540a60196824c5a498a11663d5688dd56879 |
| ppc64le | |
| vdsm-4.40.90.5-1.el8ev.ppc64le.rpm | SHA-256: cafc15f93c750c36f671d9fd9e12528af68442066c21dd0b5ebf2911d5890837 |
| vdsm-api-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: ffe16b5873af8764fa379a86e2ad720f3d8c59af6aaff0477fe0a81db5d211d7 |
| vdsm-client-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: c4cf7e79a930cb05f251e421fa4128a158f5010420981fea96937a920819e5ae |
| vdsm-common-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 33e39b4d71d37b1221e0f599f1b32fcf6a35f4f3356595eaf3bc4c7a4683bb2c |
| vdsm-hook-checkips-4.40.90.5-1.el8ev.ppc64le.rpm | SHA-256: 2c6b6c7700927b6106f230b772c972bc82e9fabb4115ef681900c1164c1e560e |
| vdsm-hook-cpuflags-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 5d24bb0b371c9a651bb78610910d757c5e9d3b69274698d1ecbf5d21169f67b3 |
| vdsm-hook-ethtool-options-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: d275e8a79cc0ecf76c0c9363bbab873636fe84573d3f68a904cfe85358236a01 |
| vdsm-hook-extra-ipv4-addrs-4.40.90.5-1.el8ev.ppc64le.rpm | SHA-256: 9979128e40e674ed83ca06cbfa284fad76932874177c281bda5c372a9df04b85 |
| vdsm-hook-fcoe-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 8006896cc1495d031f0d0252e4dbaf05b41b1640c171a3b61ab1bb34725837b1 |
| vdsm-hook-localdisk-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: a79db6f07098f073d0b33d683a44d95e9ff1a01db01c17859afee2131f3cce39 |
| vdsm-hook-nestedvt-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 45a4967c5c893afb08f8e7fa5266b5904178ca4f3a93dd59cf05823451b22f4e |
| vdsm-hook-openstacknet-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 076c9cfa5d515d9c348cddc775586a0040d27446218bbb670d2879ce32324a8f |
| vdsm-hook-vhostmd-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: ce949c6ccdd3c363434e5fafc6108409c46e9dfecec204b0ff3969333c2775df |
| vdsm-http-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: d75ad62a68d407fe31b4caf86ac20763eb71e5ab4fa72defc1bf3560c0640b3e |
| vdsm-jsonrpc-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: c55c8b365a35e040313ff6bca39d2e907129a5dc41951abe6380f270562e7fc3 |
| vdsm-network-4.40.90.5-1.el8ev.ppc64le.rpm | SHA-256: a81a16d9a1af900b1db342a5d6cfab45af5d5248cdad37dfbfd685177fe3012e |
| vdsm-python-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: 9e55fa02cf5cbcf7a027232a606c9bffbc9d81771f9a391c8f2589db23662a6a |
| vdsm-yajsonrpc-4.40.90.5-1.el8ev.noarch.rpm | SHA-256: faec23ac6ca766042bdc204801025fb11724bfe9f3b1cd3e335719a3f42570bf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.