- Issued:
- 2017-11-07
- Updated:
- 2017-11-07
RHEA-2017:3139 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.1.7
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, incorrect LVM configuration resulted in incorrect LVM output. The LVM configuration has now been fixed so that the correct LVM output is generated. The names of the generated files are as follows:
lvm_lvs_-v_-o_tags_--config_global_locking_type_0_use_lvmetad_0_devices_preferred_names_.dev.mapper._ignore_suspended_devices_1_write_cache_state_0_disable_after_error_count_3_filter_a_.dev.mapper.._r
lvm_pvs_-v_-o_all_--config_global_locking_type_0_use_lvmetad_0_devices_preferred_names_.dev.mapper._ignore_suspended_devices_1_write_cache_state_0_disable_after_error_count_3_filter_a_.dev.mapper.._r
lvm_vgs_-v_-o_tags_--config_global_locking_type_0_use_lvmetad_0_devices_preferred_names_.dev.mapper._ignore_suspended_devices_1_write_cache_state_0_disable_after_error_count_3_filter_a_.dev.mapper.._r (BZ#1483328)
- Previously, VDSM expected the optional object identifier OID field in Link Layer Discovery Protocol (LLDP). If this was absent, parsing of LLDP failed. Now, VDSM no longer expects the object identifier OID field in LLDP. LLDP info from the host is presented via the REST API without an object identifier OID. (BZ#1496677)
- Previously, when copying disks using qcow2 compressed format, the destination disk size was not calculated correctly, because it was incorrectly assumed that the disk was not compressed. Copying an uploaded disk using qcow2 compressed format, or cloning a virtual machine using such disk, would fail. Now, the system estimates the destination disk size based on the qcow2 actual image format, so it is possible to copy compressed disks and clone virtual machines that use them. (BZ#1503219)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1463218 - [downstream clone - 4.1.7] Adding rhvh-4.1-20170417.0 to engine failed with bond(active+backup) configured by cockpit
- BZ - 1483328 - [downstream clone - 4.1.7] [sos plugin] lvm commands need syntax change
- BZ - 1496677 - [downstream clone - 4.1.7] NPE when get LLDP info from host interface via REST
- BZ - 1497940 - [downstream clone - 4.1.7] Sanlock init failed with unhelpful error message "Sanlock exception"
- BZ - 1502213 - [downstream clone - 4.1.7] [downstream clone - 4.2.0] while deleting vms created from a template, vdsm command fails with error VDSM command failed: Could not remove all image's volumes
- BZ - 1503219 - [downstream clone - 4.1.7] Handle copy of compressed QCOWs image (like rhel guest images) from one to block storage domain.
- BZ - 1506161 - [downstream clone - 4.1.7] Cleanup thread for live merge executed continously if a block job failed in libvirtd side
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.36-1.el7ev.src.rpm | SHA-256: 8c903e739373b3591a8db254679b4d67f4e2a36a08bbe3b93c517487f3a3c082 |
x86_64 | |
vdsm-4.19.36-1.el7ev.x86_64.rpm | SHA-256: 6433ef64f19a9af3fdec7b407246b04539a176f3c496c1677d69adfcad456270 |
vdsm-api-4.19.36-1.el7ev.noarch.rpm | SHA-256: 73ff29946651c47b10e1accdcbc95c904efb06bfb08b820acb7636bdb50831af |
vdsm-cli-4.19.36-1.el7ev.noarch.rpm | SHA-256: 034f5055e52c59d7468ca0b602ae466c05a3691366c197ac8ee224ee2a933e64 |
vdsm-client-4.19.36-1.el7ev.noarch.rpm | SHA-256: 06bf812c5012a92a5183af54048072fb477def0ca9ff2e8cb865bf05ee95771d |
vdsm-gluster-4.19.36-1.el7ev.noarch.rpm | SHA-256: 0c176c5e6d6694f70118e703174d6ba4aaca7175fd3378b9280f403f5307aaa4 |
vdsm-hook-checkips-4.19.36-1.el7ev.x86_64.rpm | SHA-256: 8db9dbf6499eab11d041e8ed68ee5fc0bbdaf54f9e35675262a6148eb1f9229b |
vdsm-hook-ethtool-options-4.19.36-1.el7ev.noarch.rpm | SHA-256: 404638db62c065b97ef0f49579ae3d3c55c0cd5501542f8184419d7722d4b05c |
vdsm-hook-extra-ipv4-addrs-4.19.36-1.el7ev.x86_64.rpm | SHA-256: 6849dccee4bd3747b1c20be59f545237c740efc277c6e1cb82292ed7acc5a810 |
vdsm-hook-fcoe-4.19.36-1.el7ev.noarch.rpm | SHA-256: 016510ddf1ff6d25783b5eb5cb7d8f7ec610a04862af04a36eb4c1f6f1d0dd69 |
vdsm-hook-localdisk-4.19.36-1.el7ev.noarch.rpm | SHA-256: ff479f66228728ca4d9eb95136d2cb4bdfa06d4b4f3ab84507d0600a6d522792 |
vdsm-hook-macspoof-4.19.36-1.el7ev.noarch.rpm | SHA-256: 55729c81d40b392816bde3f01affdfed4edff05a56e01803bd6d7950c2864550 |
vdsm-hook-nestedvt-4.19.36-1.el7ev.noarch.rpm | SHA-256: 8525838383b84b86b4f4dc374336a71a7d2808e31b682d387eb3def37c92d4f5 |
vdsm-hook-openstacknet-4.19.36-1.el7ev.noarch.rpm | SHA-256: 174ed94fc3dffaf12f43b25a8c96d4838cd353b31375e9d0ccbc09f41cb14afa |
vdsm-hook-vfio-mdev-4.19.36-1.el7ev.noarch.rpm | SHA-256: 07f500001a2f4287714610b6a200b6fb91c027b9ec39173e726936cadc23c932 |
vdsm-hook-vhostmd-4.19.36-1.el7ev.noarch.rpm | SHA-256: eda526548693d0139343dd481b571f18477074ed7e522bc5336d8ff3789dedee |
vdsm-hook-vmfex-dev-4.19.36-1.el7ev.noarch.rpm | SHA-256: 7ba8e41963d64d0893a16d462700a83a839bd3e7f61e65d8061dc6613a35e698 |
vdsm-jsonrpc-4.19.36-1.el7ev.noarch.rpm | SHA-256: b871494c337db5a9d1219c6d0b603ffe2b9524826f6df45a81450b806f95a90b |
vdsm-python-4.19.36-1.el7ev.noarch.rpm | SHA-256: 6703dbd174fd6164246edead651bb9523a15bef23d47515c8f409b7cd8cc6f6d |
vdsm-xmlrpc-4.19.36-1.el7ev.noarch.rpm | SHA-256: e0adbb17e6b67729c8264f650ce29b12f4ae49c728d6f5916ae9233b7c4f3f25 |
vdsm-yajsonrpc-4.19.36-1.el7ev.noarch.rpm | SHA-256: c3db87e23a122d28dafe6a8ab0a1881d6ee48b2306653908f499e06896ce9cde |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.36-1.el7ev.src.rpm | SHA-256: 8c903e739373b3591a8db254679b4d67f4e2a36a08bbe3b93c517487f3a3c082 |
ppc64le | |
vdsm-4.19.36-1.el7ev.ppc64le.rpm | SHA-256: 70d93e310fa5b12aeaaa053d9b2bfac51d4cbc626143cc1350887cd16d22db34 |
vdsm-api-4.19.36-1.el7ev.noarch.rpm | SHA-256: 73ff29946651c47b10e1accdcbc95c904efb06bfb08b820acb7636bdb50831af |
vdsm-cli-4.19.36-1.el7ev.noarch.rpm | SHA-256: 034f5055e52c59d7468ca0b602ae466c05a3691366c197ac8ee224ee2a933e64 |
vdsm-client-4.19.36-1.el7ev.noarch.rpm | SHA-256: 06bf812c5012a92a5183af54048072fb477def0ca9ff2e8cb865bf05ee95771d |
vdsm-hook-checkips-4.19.36-1.el7ev.ppc64le.rpm | SHA-256: d1dc9b647e7f8c3ce0ef54e552e684b6866ab5fed6d3761e771b33d18b28cd27 |
vdsm-hook-ethtool-options-4.19.36-1.el7ev.noarch.rpm | SHA-256: 404638db62c065b97ef0f49579ae3d3c55c0cd5501542f8184419d7722d4b05c |
vdsm-hook-extra-ipv4-addrs-4.19.36-1.el7ev.ppc64le.rpm | SHA-256: ab5c57c9dba2f27e8256065e99717578d19285b2aa02f0f270de98689a7ffb21 |
vdsm-hook-fcoe-4.19.36-1.el7ev.noarch.rpm | SHA-256: 016510ddf1ff6d25783b5eb5cb7d8f7ec610a04862af04a36eb4c1f6f1d0dd69 |
vdsm-hook-localdisk-4.19.36-1.el7ev.noarch.rpm | SHA-256: ff479f66228728ca4d9eb95136d2cb4bdfa06d4b4f3ab84507d0600a6d522792 |
vdsm-hook-macspoof-4.19.36-1.el7ev.noarch.rpm | SHA-256: 55729c81d40b392816bde3f01affdfed4edff05a56e01803bd6d7950c2864550 |
vdsm-hook-nestedvt-4.19.36-1.el7ev.noarch.rpm | SHA-256: 8525838383b84b86b4f4dc374336a71a7d2808e31b682d387eb3def37c92d4f5 |
vdsm-hook-openstacknet-4.19.36-1.el7ev.noarch.rpm | SHA-256: 174ed94fc3dffaf12f43b25a8c96d4838cd353b31375e9d0ccbc09f41cb14afa |
vdsm-hook-vfio-mdev-4.19.36-1.el7ev.noarch.rpm | SHA-256: 07f500001a2f4287714610b6a200b6fb91c027b9ec39173e726936cadc23c932 |
vdsm-hook-vhostmd-4.19.36-1.el7ev.noarch.rpm | SHA-256: eda526548693d0139343dd481b571f18477074ed7e522bc5336d8ff3789dedee |
vdsm-hook-vmfex-dev-4.19.36-1.el7ev.noarch.rpm | SHA-256: 7ba8e41963d64d0893a16d462700a83a839bd3e7f61e65d8061dc6613a35e698 |
vdsm-jsonrpc-4.19.36-1.el7ev.noarch.rpm | SHA-256: b871494c337db5a9d1219c6d0b603ffe2b9524826f6df45a81450b806f95a90b |
vdsm-python-4.19.36-1.el7ev.noarch.rpm | SHA-256: 6703dbd174fd6164246edead651bb9523a15bef23d47515c8f409b7cd8cc6f6d |
vdsm-xmlrpc-4.19.36-1.el7ev.noarch.rpm | SHA-256: e0adbb17e6b67729c8264f650ce29b12f4ae49c728d6f5916ae9233b7c4f3f25 |
vdsm-yajsonrpc-4.19.36-1.el7ev.noarch.rpm | SHA-256: c3db87e23a122d28dafe6a8ab0a1881d6ee48b2306653908f499e06896ce9cde |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.