- Issued:
- 2017-12-12
- Updated:
- 2017-12-12
RHEA-2017:3428 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.1.8
Type/Severity
Product Enhancement Advisory
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- This update ensures that during a cold merge the system will identify and handle leaked clusters reported by the QCOW2 image, to ensure that the cold merge succeeds. (BZ#1506503)
- This update ensures that TLSv12 support is enabled by default and no manual configuration is required. (BZ#1513886)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/2974891
Affected Products
- Red Hat Virtualization 4 x86_64
- Red Hat Virtualization for IBM Power LE 4 ppc64le
Fixes
- BZ - 1506157 - [BLOCKED][downstream clone - 4.1.8] During a Live Merge, VDSM still saw a block job, even though libvirt's block job had completed.
- BZ - 1506503 - [downstream clone - 4.1.8] Cold merge will fail if the base qcow2 image reports leaked cluster
- BZ - 1509614 - [downstream clone - 4.1.8] "No such drive" error on live merge of one disk causes merge of other disk to fail on engine.
- BZ - 1513886 - [downstream clone - 4.1.8] [RFE] Enable TLSv12 support by default
CVEs
(none)
References
(none)
Red Hat Virtualization 4
| SRPM | |
|---|---|
| vdsm-4.19.42-1.el7ev.src.rpm | SHA-256: a9d45f54a49e06789284cadbf92cba5c7d16ac3215c6aa7491156dc1037a2337 |
| x86_64 | |
| vdsm-4.19.42-1.el7ev.x86_64.rpm | SHA-256: 6a4b2fd823e3e633e39e25c6c2992eeb42ad4e1876cef9d4db85742cc67b8e2a |
| vdsm-api-4.19.42-1.el7ev.noarch.rpm | SHA-256: 658b4abfe70d6ebb7a4ce3ce988e1d15a55144bba05ed61bf7f24bfe94ae3c68 |
| vdsm-cli-4.19.42-1.el7ev.noarch.rpm | SHA-256: ef27a8a7359744c0786c0a08f7b5474667b15fbb313a5e72a3554a15b073021e |
| vdsm-client-4.19.42-1.el7ev.noarch.rpm | SHA-256: 17ba9fbb9cfbfb04b09893c21281140a94a0ba397f0ba667bccbcfdb9ded692d |
| vdsm-gluster-4.19.42-1.el7ev.noarch.rpm | SHA-256: 6e37f060c6abb39ae4a35edf64ea6fe5eb8bdc29c02942fd350618b7725cac1f |
| vdsm-hook-checkips-4.19.42-1.el7ev.x86_64.rpm | SHA-256: 774e85655f1c2c469066d99f244499b24321553113be7f057638f37c81731624 |
| vdsm-hook-ethtool-options-4.19.42-1.el7ev.noarch.rpm | SHA-256: dad7b0c9fc3f1f3f580734cbef4bd7d8be5d37da020c560f7fbf0fb923dbc898 |
| vdsm-hook-extra-ipv4-addrs-4.19.42-1.el7ev.x86_64.rpm | SHA-256: b350ca24045b2c5d3a522253bd7b9167de78712644072931204aeb3416571833 |
| vdsm-hook-fcoe-4.19.42-1.el7ev.noarch.rpm | SHA-256: 83da21256d764829f34c6ffe4edf12f65fad43087358656983307aace4c5cef1 |
| vdsm-hook-localdisk-4.19.42-1.el7ev.noarch.rpm | SHA-256: d4a67ee901b7489fe654fb4fde3f6a968d26b9b76efaf1036daba5bad3b91aaf |
| vdsm-hook-macspoof-4.19.42-1.el7ev.noarch.rpm | SHA-256: 3c9e989a1aed045fa74dadbe396962614d1aef09c6c2e41f9db3bbe81da9cb4a |
| vdsm-hook-nestedvt-4.19.42-1.el7ev.noarch.rpm | SHA-256: 31ab60ddbe3af1f1fa72bc73ccf81766ee3e66c221ea7a0f7b412f34feb14017 |
| vdsm-hook-openstacknet-4.19.42-1.el7ev.noarch.rpm | SHA-256: d1090cf7f525872beaa1299769116c7af9c2836fe78e6f8158815ace47439dcc |
| vdsm-hook-vfio-mdev-4.19.42-1.el7ev.noarch.rpm | SHA-256: b3b25f36ba2b565417c4c1e68ce6ddb517bf5699ebd3cc54d52ec61702a0aa7e |
| vdsm-hook-vhostmd-4.19.42-1.el7ev.noarch.rpm | SHA-256: acefad237803f30b9a20673668c6865effca3afb35669ed408153522b41988a0 |
| vdsm-hook-vmfex-dev-4.19.42-1.el7ev.noarch.rpm | SHA-256: 85650063b77904f9ce6b7d368e105100e0d34bf2b61547b1d3d3404ba5bd2d8e |
| vdsm-jsonrpc-4.19.42-1.el7ev.noarch.rpm | SHA-256: c11535c5431e18f75c0458935ca94f90e91a6ade7975bb3bd4f27d19122847da |
| vdsm-python-4.19.42-1.el7ev.noarch.rpm | SHA-256: dab38630019af9d3496db1100d1beaa643330abe74d23b7b472cca84c21f3549 |
| vdsm-xmlrpc-4.19.42-1.el7ev.noarch.rpm | SHA-256: 68742643123acf87dda4674ddb0ef92392fd00cd1067d89fd137b6a132c7138b |
| vdsm-yajsonrpc-4.19.42-1.el7ev.noarch.rpm | SHA-256: 496da98772867b392a6eac1c97dc3986e266611f3e0b9d9c486f301eb69c24d3 |
Red Hat Virtualization for IBM Power LE 4
| SRPM | |
|---|---|
| vdsm-4.19.42-1.el7ev.src.rpm | SHA-256: a9d45f54a49e06789284cadbf92cba5c7d16ac3215c6aa7491156dc1037a2337 |
| ppc64le | |
| vdsm-4.19.42-1.el7ev.ppc64le.rpm | SHA-256: a915c9b4e91c9fb93c15f40b797cbfe879f473ccae96bd492c0502ce325a5a58 |
| vdsm-api-4.19.42-1.el7ev.noarch.rpm | SHA-256: 658b4abfe70d6ebb7a4ce3ce988e1d15a55144bba05ed61bf7f24bfe94ae3c68 |
| vdsm-cli-4.19.42-1.el7ev.noarch.rpm | SHA-256: ef27a8a7359744c0786c0a08f7b5474667b15fbb313a5e72a3554a15b073021e |
| vdsm-client-4.19.42-1.el7ev.noarch.rpm | SHA-256: 17ba9fbb9cfbfb04b09893c21281140a94a0ba397f0ba667bccbcfdb9ded692d |
| vdsm-hook-checkips-4.19.42-1.el7ev.ppc64le.rpm | SHA-256: 70e67e31bfc4cce574fa0cbf0479ef8d9a4ee5c4bd666ee1415d48344099bb3a |
| vdsm-hook-ethtool-options-4.19.42-1.el7ev.noarch.rpm | SHA-256: dad7b0c9fc3f1f3f580734cbef4bd7d8be5d37da020c560f7fbf0fb923dbc898 |
| vdsm-hook-extra-ipv4-addrs-4.19.42-1.el7ev.ppc64le.rpm | SHA-256: 2d20a04348fbf9a6649818e6c049b743f559acca87047b052c2c36362d041f95 |
| vdsm-hook-fcoe-4.19.42-1.el7ev.noarch.rpm | SHA-256: 83da21256d764829f34c6ffe4edf12f65fad43087358656983307aace4c5cef1 |
| vdsm-hook-localdisk-4.19.42-1.el7ev.noarch.rpm | SHA-256: d4a67ee901b7489fe654fb4fde3f6a968d26b9b76efaf1036daba5bad3b91aaf |
| vdsm-hook-macspoof-4.19.42-1.el7ev.noarch.rpm | SHA-256: 3c9e989a1aed045fa74dadbe396962614d1aef09c6c2e41f9db3bbe81da9cb4a |
| vdsm-hook-nestedvt-4.19.42-1.el7ev.noarch.rpm | SHA-256: 31ab60ddbe3af1f1fa72bc73ccf81766ee3e66c221ea7a0f7b412f34feb14017 |
| vdsm-hook-openstacknet-4.19.42-1.el7ev.noarch.rpm | SHA-256: d1090cf7f525872beaa1299769116c7af9c2836fe78e6f8158815ace47439dcc |
| vdsm-hook-vfio-mdev-4.19.42-1.el7ev.noarch.rpm | SHA-256: b3b25f36ba2b565417c4c1e68ce6ddb517bf5699ebd3cc54d52ec61702a0aa7e |
| vdsm-hook-vhostmd-4.19.42-1.el7ev.noarch.rpm | SHA-256: acefad237803f30b9a20673668c6865effca3afb35669ed408153522b41988a0 |
| vdsm-hook-vmfex-dev-4.19.42-1.el7ev.noarch.rpm | SHA-256: 85650063b77904f9ce6b7d368e105100e0d34bf2b61547b1d3d3404ba5bd2d8e |
| vdsm-jsonrpc-4.19.42-1.el7ev.noarch.rpm | SHA-256: c11535c5431e18f75c0458935ca94f90e91a6ade7975bb3bd4f27d19122847da |
| vdsm-python-4.19.42-1.el7ev.noarch.rpm | SHA-256: dab38630019af9d3496db1100d1beaa643330abe74d23b7b472cca84c21f3549 |
| vdsm-xmlrpc-4.19.42-1.el7ev.noarch.rpm | SHA-256: 68742643123acf87dda4674ddb0ef92392fd00cd1067d89fd137b6a132c7138b |
| vdsm-yajsonrpc-4.19.42-1.el7ev.noarch.rpm | SHA-256: 496da98772867b392a6eac1c97dc3986e266611f3e0b9d9c486f301eb69c24d3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
