- Issued:
- 2022-07-14
- Updated:
- 2022-07-14
RHBA-2022:5583 - Bug Fix Advisory
Synopsis
RHV RHEL Host (ovirt-host) [ovirt-4.5.1] update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated host packages that fix several bugs and add various enhancements are now available.
Description
The ovirt-host package consolidates host package requirements into a single meta package.
Changes to the ovirt-hosted-engine-setup component:
- The hosted-engine --deploy --restore-from-file prompts now include guidance to clarify the options and to ensure correct input. (BZ#1881280)
Changes to the vdsm component of Bugzilla:
- The default migration timeout period has been increased to enable VMs with many direct LUN disks, which require more preparation time on the destination host, to be migrated.
The migration_listener_prepare_disk_timeout and max_migration_listener_timeout VDSM options have been added so that the default migration timeout period can be extended if necessary. (BZ#2055905)
- The QEMU guest agent now reports the correct guest CPU count. (BZ#2077008)
- Infiniband interfaces are now reported by VDSM. (BZ#2081359)
- The size of preallocated volumes is unchanged after a cold merge. (BZ#2081493)
- LVM command error messages have been improved so that it is easier to trace and debug errors. (BZ#2048545)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 8 x86_64
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 8 ppc64le
Fixes
- BZ - 1868372 - collectd-virt plugin doesn't work with latest libvirt
- BZ - 1881280 - [RFE] Validate HE cluster if --restore-from-file
- BZ - 1932147 - [RFE] Support specifying storage domain format (V3, V4, V5...) in ansible ovirt_storage_domain module
- BZ - 2048545 - Bogus errors and warning when looking up NFS storage domain using LVM
- BZ - 2055905 - Virtual Machine with large number of Direct LUNs failed to migrate without adjusting vars/migration_listener_timeout
- BZ - 2075795 - "Too many open files" error causes vdsm not being able to work properly
- BZ - 2077008 - guest cpu count not working for RHEL8 guests
- BZ - 2081359 - IPoIB interfaces not reported by supervdsm network_caps
- BZ - 2081493 - Preallocated COW volume is reduced by cold merge
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 8
SRPM | |
---|---|
ovirt-hosted-engine-setup-2.6.4-1.el8ev.src.rpm | SHA-256: 7ac20164fd38a24831cee49072f11d2c3d2691cf20c1b7321304b09cdf81a44b |
vdsm-4.50.1.3-1.el8ev.src.rpm | SHA-256: a53433a270b7473691a548791487c494df4010abaa7dc20e82176cd726418368 |
x86_64 | |
ovirt-hosted-engine-setup-2.6.4-1.el8ev.noarch.rpm | SHA-256: d4d708589cd24fdd8fecab591a0c29a0f68ec37943cf431e2aa0e96f2a7e1d47 |
vdsm-4.50.1.3-1.el8ev.x86_64.rpm | SHA-256: 4887239feedb717d4abe025aa4d7e0f687ad7d09df92636dea7cb2f876db97c4 |
vdsm-api-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: e1e846ac99f0427bdc37bca280abff07725b93691c2f164de217f1333778437e |
vdsm-client-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 5cc78efb6836276fe0fddb20999a02faf091735d975fb92e2542bf27c865a98f |
vdsm-common-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 27e64e5c806690e5f28ba9cb7078300ecaebd4a526abd6af76245d437c45f9b4 |
vdsm-gluster-4.50.1.3-1.el8ev.x86_64.rpm | SHA-256: 2f3d01de369ca2120ffb49eead8815d4385a7ba5c73ac2799640675e77f62207 |
vdsm-hook-checkips-4.50.1.3-1.el8ev.x86_64.rpm | SHA-256: eceaa67e01dd57132f60b850be6a51d8517c0e68f4361be2cda79c9acf5e5c35 |
vdsm-hook-cpuflags-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 41cc15af700c11095de8348a7eef6ff471ff0edef4c06c5b96312c119348b94a |
vdsm-hook-ethtool-options-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 09c500133031ccf49135fafe0d2e56d36d7077331904f30478cc161eb8ee5adf |
vdsm-hook-extra-ipv4-addrs-4.50.1.3-1.el8ev.x86_64.rpm | SHA-256: 8ac4dfdc7163fb5e928d07819db0f19018e1c018642b3d2ca4b0f52278fedccf |
vdsm-hook-fcoe-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: cbb05c0aa27c27d7ce2fef19aa32c605274253b188638efb9ab3297a6e3ded4b |
vdsm-hook-localdisk-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 419677e58fd0d0669043b932e2338aa6514a6784ce4282ef5792803e3d2a8398 |
vdsm-hook-nestedvt-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: c47aeac9bf7961bbb6691baf7142fcdfae73c9a745e4171cffee3353b12c9551 |
vdsm-hook-openstacknet-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: ca6a822f8966a5c2cc69508a34448ce8aca972d969376a06eb6dc36f54dbc863 |
vdsm-hook-vhostmd-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 4d9fcb029a47df5b43b7b606f1c034cacd405ab4338fefef62eb954364973372 |
vdsm-http-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 33c8aca40cc7d866927f72ec588f3963706dab8fdee28c0d5359c5b76aa9288b |
vdsm-jsonrpc-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: eebde030b0633a672685696a323a5725a18ede84235b36f9bb7a7a06d9fd5156 |
vdsm-network-4.50.1.3-1.el8ev.x86_64.rpm | SHA-256: 6a48cb825c2ee46c0ff40b9c9b2f38d4f6d48c5ebe1897b46185aad708111dbb |
vdsm-python-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 40eda6db1613ea0ce0c1cb55529a4d8bb67600c2ecd1b1a002f95894862def29 |
vdsm-yajsonrpc-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: fd0b76970a427eb52d012f8d958d4319dd4a5bc4c3a36c962cabdcd7206c3c66 |
Red Hat Virtualization Host 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.50.1.3-1.el8ev.src.rpm | SHA-256: a53433a270b7473691a548791487c494df4010abaa7dc20e82176cd726418368 |
x86_64 | |
vdsm-hook-checkips-4.50.1.3-1.el8ev.x86_64.rpm | SHA-256: eceaa67e01dd57132f60b850be6a51d8517c0e68f4361be2cda79c9acf5e5c35 |
vdsm-hook-cpuflags-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 41cc15af700c11095de8348a7eef6ff471ff0edef4c06c5b96312c119348b94a |
vdsm-hook-ethtool-options-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 09c500133031ccf49135fafe0d2e56d36d7077331904f30478cc161eb8ee5adf |
vdsm-hook-extra-ipv4-addrs-4.50.1.3-1.el8ev.x86_64.rpm | SHA-256: 8ac4dfdc7163fb5e928d07819db0f19018e1c018642b3d2ca4b0f52278fedccf |
vdsm-hook-fcoe-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: cbb05c0aa27c27d7ce2fef19aa32c605274253b188638efb9ab3297a6e3ded4b |
vdsm-hook-localdisk-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 419677e58fd0d0669043b932e2338aa6514a6784ce4282ef5792803e3d2a8398 |
vdsm-hook-nestedvt-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: c47aeac9bf7961bbb6691baf7142fcdfae73c9a745e4171cffee3353b12c9551 |
vdsm-hook-openstacknet-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: ca6a822f8966a5c2cc69508a34448ce8aca972d969376a06eb6dc36f54dbc863 |
vdsm-hook-vhostmd-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 4d9fcb029a47df5b43b7b606f1c034cacd405ab4338fefef62eb954364973372 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.50.1.3-1.el8ev.src.rpm | SHA-256: a53433a270b7473691a548791487c494df4010abaa7dc20e82176cd726418368 |
ppc64le | |
vdsm-4.50.1.3-1.el8ev.ppc64le.rpm | SHA-256: f3c87d3e1d1e1870edcf1887567ffd568d4693b586231fa26ce51c4f38cd2680 |
vdsm-api-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: e1e846ac99f0427bdc37bca280abff07725b93691c2f164de217f1333778437e |
vdsm-client-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 5cc78efb6836276fe0fddb20999a02faf091735d975fb92e2542bf27c865a98f |
vdsm-common-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 27e64e5c806690e5f28ba9cb7078300ecaebd4a526abd6af76245d437c45f9b4 |
vdsm-hook-checkips-4.50.1.3-1.el8ev.ppc64le.rpm | SHA-256: 3e667e6e0de43ab2b8f0cfb91124a65d4659b83f5a9365a8213dbd636ba8badc |
vdsm-hook-cpuflags-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 41cc15af700c11095de8348a7eef6ff471ff0edef4c06c5b96312c119348b94a |
vdsm-hook-ethtool-options-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 09c500133031ccf49135fafe0d2e56d36d7077331904f30478cc161eb8ee5adf |
vdsm-hook-extra-ipv4-addrs-4.50.1.3-1.el8ev.ppc64le.rpm | SHA-256: c4190a493b9c885f360629f9988760a6d310dcf12de93c634fe41d09819baecf |
vdsm-hook-fcoe-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: cbb05c0aa27c27d7ce2fef19aa32c605274253b188638efb9ab3297a6e3ded4b |
vdsm-hook-localdisk-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 419677e58fd0d0669043b932e2338aa6514a6784ce4282ef5792803e3d2a8398 |
vdsm-hook-nestedvt-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: c47aeac9bf7961bbb6691baf7142fcdfae73c9a745e4171cffee3353b12c9551 |
vdsm-hook-openstacknet-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: ca6a822f8966a5c2cc69508a34448ce8aca972d969376a06eb6dc36f54dbc863 |
vdsm-hook-vhostmd-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 4d9fcb029a47df5b43b7b606f1c034cacd405ab4338fefef62eb954364973372 |
vdsm-http-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 33c8aca40cc7d866927f72ec588f3963706dab8fdee28c0d5359c5b76aa9288b |
vdsm-jsonrpc-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: eebde030b0633a672685696a323a5725a18ede84235b36f9bb7a7a06d9fd5156 |
vdsm-network-4.50.1.3-1.el8ev.ppc64le.rpm | SHA-256: 0335278a475a4c29229b3c9612e44f61b3774bcb6e95ff76df82741d07cce9cf |
vdsm-python-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: 40eda6db1613ea0ce0c1cb55529a4d8bb67600c2ecd1b1a002f95894862def29 |
vdsm-yajsonrpc-4.50.1.3-1.el8ev.noarch.rpm | SHA-256: fd0b76970a427eb52d012f8d958d4319dd4a5bc4c3a36c962cabdcd7206c3c66 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.