- Issued:
- 2017-09-19
- Updated:
- 2017-09-19
RHEA-2017:2750 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.1.6
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously when an imported virtual machine contained a CD-ROM with a source that is unreachable, it caused the whole virtual machine to be rejected. This has now been fixed and virtual machines with an unreachable CD-ROM can also be imported. (BZ#1485807)
- Previously, when a virtual machine was migrating to a different host and the source host became unavailable, the virtual machine could end up running on two hosts simultaneously. This has now been fixed. (BZ#1487913)
- A new VDSM hook that configures the nested virtualization feature in Red Hat Enterprise Linux 7 is now available as a tech preview. Nested virtualization allows a virtual machine to serve as a hypervisor. VDSM hooks are a means to insert code, commands, or scripts into a point in the lifecycle of a virtual machine, as well as the lifecycle of the VDSM daemon.
Packages and features released under tech preview are not fully supported under Red Hat Subscription Level Agreements, and may not be functionally complete, and are not intended for production use. (BZ#1481150)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1481150 - [RFE] add nested virtualization hook vdsm-hook-nestedvt
- BZ - 1485807 - virt-v2v: trying to import a VM with unreachable cdrom device caused the import to fail with "disk storage error"
- BZ - 1487913 - Migration leads to VM running on 2 Hosts
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.31-1.el7ev.src.rpm | SHA-256: cbc5795e0c5176a0968553e624ea8ff7e7e643af152aff83edf94bf6b2b520cc |
x86_64 | |
vdsm-4.19.31-1.el7ev.x86_64.rpm | SHA-256: afe8af4853d7c85a35bfe4aacce69fd9a7a2ea55a319d8e8df8c13bbbd2ea9dd |
vdsm-api-4.19.31-1.el7ev.noarch.rpm | SHA-256: 2b6915b8149b0686ef981a71fdad304c5cb3dcc5dc3837aa94ce308092ab58e6 |
vdsm-cli-4.19.31-1.el7ev.noarch.rpm | SHA-256: c9d217692718e6b13db3b9b4064f7fccffa2983dd4855672bebc552875b794bf |
vdsm-client-4.19.31-1.el7ev.noarch.rpm | SHA-256: 5ef806995d1cbc0d096b6f380399cd38e24024f1bcfaf320614f5bc9694cfcf9 |
vdsm-gluster-4.19.31-1.el7ev.noarch.rpm | SHA-256: f72a286002ef3eadca9d6d1339ccb1b84d9febf79295a1618048d2d83efc5a99 |
vdsm-hook-checkips-4.19.31-1.el7ev.x86_64.rpm | SHA-256: 77a5ad030947d4f89b45fe320a0636139be789fa91b823f72388bfef012c6127 |
vdsm-hook-ethtool-options-4.19.31-1.el7ev.noarch.rpm | SHA-256: 8410dfde609fc33b278232a31b909640ec22ef5b8c6155dd8979e0dfc2eea80b |
vdsm-hook-extra-ipv4-addrs-4.19.31-1.el7ev.x86_64.rpm | SHA-256: 4c1e6c6f6aba17dd55be415b62f65fb0c5c576552922342c1d32f0aba74d2092 |
vdsm-hook-fcoe-4.19.31-1.el7ev.noarch.rpm | SHA-256: 14b09dce00f98dd0b8ee8e148ff3fd0102831826a1e24a6c7bc26e3ba0f0ab9e |
vdsm-hook-localdisk-4.19.31-1.el7ev.noarch.rpm | SHA-256: 8758dbe3503d7f5e4ca77fa0d9b12e799ef3d14155ccd7b49c57c3af2f4a24c6 |
vdsm-hook-macspoof-4.19.31-1.el7ev.noarch.rpm | SHA-256: 590b90afc05c5da507b9c206c9b8017668e44b0b851e5165b6152688f8f467aa |
vdsm-hook-nestedvt-4.19.31-1.el7ev.noarch.rpm | SHA-256: 925075f2a2e6387b9c0f9a21e49dca6e1da4c76063b04c3b99e45d0c16b6b715 |
vdsm-hook-openstacknet-4.19.31-1.el7ev.noarch.rpm | SHA-256: 5cc98e4cf8ee2c7cb822771b06c399e9bc423f34bd89f162a082504b886f4fa2 |
vdsm-hook-vfio-mdev-4.19.31-1.el7ev.noarch.rpm | SHA-256: f0b994784a7c9e609ad6c734f1e98d5480a5872988a5658f3b02f715ef6f43ee |
vdsm-hook-vhostmd-4.19.31-1.el7ev.noarch.rpm | SHA-256: fbb9e93ccef0a33939f1fcb7e9658dd8db0f73fe29f48451886de19d2549288e |
vdsm-hook-vmfex-dev-4.19.31-1.el7ev.noarch.rpm | SHA-256: e962ad98c92049157e5ee894dfd3cdb6d7c96959ef19b23b2985034c869aaa8f |
vdsm-jsonrpc-4.19.31-1.el7ev.noarch.rpm | SHA-256: 53f2eb9955e289306dc08a2eb05021bf1a51c955579efd502f7395e02b65e55d |
vdsm-python-4.19.31-1.el7ev.noarch.rpm | SHA-256: a973f90721333a95e5aa00d4bd7f8427da3f6083ef90496d39c76b444ca820cf |
vdsm-xmlrpc-4.19.31-1.el7ev.noarch.rpm | SHA-256: 329c048464279e6071978abc5d2e768a9d30d0e01edf873d0c890d0ae0ba26da |
vdsm-yajsonrpc-4.19.31-1.el7ev.noarch.rpm | SHA-256: 9f06bf8ec7800f389471f1e4e720de1124757d2d8535f7c5b84fbfe096d4c1a7 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.31-1.el7ev.src.rpm | SHA-256: cbc5795e0c5176a0968553e624ea8ff7e7e643af152aff83edf94bf6b2b520cc |
ppc64le | |
vdsm-4.19.31-1.el7ev.ppc64le.rpm | SHA-256: 64357d990216a4a5944d5c37261c79bd0b0b3ebb303116edc50e6b316b231b3b |
vdsm-api-4.19.31-1.el7ev.noarch.rpm | SHA-256: 2b6915b8149b0686ef981a71fdad304c5cb3dcc5dc3837aa94ce308092ab58e6 |
vdsm-cli-4.19.31-1.el7ev.noarch.rpm | SHA-256: c9d217692718e6b13db3b9b4064f7fccffa2983dd4855672bebc552875b794bf |
vdsm-client-4.19.31-1.el7ev.noarch.rpm | SHA-256: 5ef806995d1cbc0d096b6f380399cd38e24024f1bcfaf320614f5bc9694cfcf9 |
vdsm-hook-checkips-4.19.31-1.el7ev.ppc64le.rpm | SHA-256: 2bd198d0b941087b75e4f52cabead0a1c257c1f42859535299fd51084d449b14 |
vdsm-hook-ethtool-options-4.19.31-1.el7ev.noarch.rpm | SHA-256: 8410dfde609fc33b278232a31b909640ec22ef5b8c6155dd8979e0dfc2eea80b |
vdsm-hook-extra-ipv4-addrs-4.19.31-1.el7ev.ppc64le.rpm | SHA-256: 81b250c55bb56b210b52d7b244a8163b1f2b382e452b8ae0ce969218ac3a5682 |
vdsm-hook-fcoe-4.19.31-1.el7ev.noarch.rpm | SHA-256: 14b09dce00f98dd0b8ee8e148ff3fd0102831826a1e24a6c7bc26e3ba0f0ab9e |
vdsm-hook-localdisk-4.19.31-1.el7ev.noarch.rpm | SHA-256: 8758dbe3503d7f5e4ca77fa0d9b12e799ef3d14155ccd7b49c57c3af2f4a24c6 |
vdsm-hook-macspoof-4.19.31-1.el7ev.noarch.rpm | SHA-256: 590b90afc05c5da507b9c206c9b8017668e44b0b851e5165b6152688f8f467aa |
vdsm-hook-nestedvt-4.19.31-1.el7ev.noarch.rpm | SHA-256: 925075f2a2e6387b9c0f9a21e49dca6e1da4c76063b04c3b99e45d0c16b6b715 |
vdsm-hook-openstacknet-4.19.31-1.el7ev.noarch.rpm | SHA-256: 5cc98e4cf8ee2c7cb822771b06c399e9bc423f34bd89f162a082504b886f4fa2 |
vdsm-hook-vfio-mdev-4.19.31-1.el7ev.noarch.rpm | SHA-256: f0b994784a7c9e609ad6c734f1e98d5480a5872988a5658f3b02f715ef6f43ee |
vdsm-hook-vhostmd-4.19.31-1.el7ev.noarch.rpm | SHA-256: fbb9e93ccef0a33939f1fcb7e9658dd8db0f73fe29f48451886de19d2549288e |
vdsm-hook-vmfex-dev-4.19.31-1.el7ev.noarch.rpm | SHA-256: e962ad98c92049157e5ee894dfd3cdb6d7c96959ef19b23b2985034c869aaa8f |
vdsm-jsonrpc-4.19.31-1.el7ev.noarch.rpm | SHA-256: 53f2eb9955e289306dc08a2eb05021bf1a51c955579efd502f7395e02b65e55d |
vdsm-python-4.19.31-1.el7ev.noarch.rpm | SHA-256: a973f90721333a95e5aa00d4bd7f8427da3f6083ef90496d39c76b444ca820cf |
vdsm-xmlrpc-4.19.31-1.el7ev.noarch.rpm | SHA-256: 329c048464279e6071978abc5d2e768a9d30d0e01edf873d0c890d0ae0ba26da |
vdsm-yajsonrpc-4.19.31-1.el7ev.noarch.rpm | SHA-256: 9f06bf8ec7800f389471f1e4e720de1124757d2d8535f7c5b84fbfe096d4c1a7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.