Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2018:0136 - Product Enhancement Advisory
Issued:
2018-01-24
Updated:
2018-01-24

RHEA-2018:0136 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

VDSM bug fix and enhancement update 4.1.9

Type/Severity

Product Enhancement Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated vdsm packages that fix several bugs and add various enhancements are now available.

Description

VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.

Changes to the vdsm component:

  • Currently, LVM scans and activates raw volumes during boot. Then it scans and activates guest logical volumes created inside a guest on top of the raw volumes. It also scans and activates guest logical volumes inside LUNs which are not part of a Red Hat Virtualization storage domain. As a result, there may be thousands of active logical volumes on a host, which should not be active. This leads to very slow boot time and may lead to data corruption later if a logical volume active on the host was extended on another host.

To avoid this, you can configure an LVM filter using the "vdsm-tool config-lvm-filter" command. The LVM filter prevents scanning and activation of logical volumes not required by the host, which improves boot time. (BZ#1524500)

  • Previously, VDSM was accessing NFS storage directly when performing lease operations. A bug in Python could cause the entire VDSM process to hang if the NFS storage was not responsive. VDSM could become unkillable (D state) for many hours, until the host was rebooted. Now, VDSM uses an external process to access NFS storage, so it can continue to function correctly even if the NFS storage becomes non-responsive, and can be restarted if needed. (BZ#1527827)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le

Fixes

  • BZ - 1524500 - [downstream clone - 4.1.9] Guest LVs created on raw volumes are auto activated on the hypervisor with FC storage (lvm filter?)
  • BZ - 1527827 - [downstream clone - 4.1.9] Entire vdsm process hang during when formatting xlease volume on NFS storage domain
  • BZ - 1530630 - [downstream clone - 4.1.9] vdsm-tool remove-config does not revert changes

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
vdsm-4.19.45-1.el7ev.src.rpm SHA-256: 4c252f40bb75d543b77cdb730c31755313464f5afb0ca3110b4de86c35ddbc10
x86_64
vdsm-4.19.45-1.el7ev.x86_64.rpm SHA-256: 4ff29119a0bddaf3b7fb80a0004e1354b2af3bffecc4b2b70b20cc28732ed887
vdsm-api-4.19.45-1.el7ev.noarch.rpm SHA-256: 0270352e4af77f6b9f02e20912a0c16eec5e244a9aff6b06e9d3d0222dbb206d
vdsm-cli-4.19.45-1.el7ev.noarch.rpm SHA-256: 2a6474d43af4660b799a79c20e1e1aa412956b020e675e690d92ffe0e90b70ed
vdsm-client-4.19.45-1.el7ev.noarch.rpm SHA-256: ef9ee83fac0206613a1c0c5d79f11ee7c4858730e5e23bcf4a5a1306bf7ff295
vdsm-gluster-4.19.45-1.el7ev.noarch.rpm SHA-256: 503560757bc99bb95c896629743c7db5362445f4d65f0b0a9fb238043cf7db9e
vdsm-hook-checkips-4.19.45-1.el7ev.x86_64.rpm SHA-256: 93bf2d4dee477c6b728aa8f9a87217187e54f54beab7886f0e1dea0b0fbbdc89
vdsm-hook-ethtool-options-4.19.45-1.el7ev.noarch.rpm SHA-256: 22cdb15067d48d90dacb863cfa6d9be079a4738e1515536575faab157d546165
vdsm-hook-extra-ipv4-addrs-4.19.45-1.el7ev.x86_64.rpm SHA-256: 0cd2981e4e31d965b77d54e65af9a6854572a05a515a6311efec0e817dcd2ce8
vdsm-hook-fcoe-4.19.45-1.el7ev.noarch.rpm SHA-256: 5f4955633e02f47c3e881aeff91b8e70620d63f3ec8161ed2b53f27240030b1b
vdsm-hook-localdisk-4.19.45-1.el7ev.noarch.rpm SHA-256: 1a309056c4ba7c86ad824c71389b24ee3e06061acc8a19eb4a5b3bad7e2e12b7
vdsm-hook-macspoof-4.19.45-1.el7ev.noarch.rpm SHA-256: 4945b087b65b999a5b11ece89e9ec93149efc236b611f137253d1afb5ac1795e
vdsm-hook-nestedvt-4.19.45-1.el7ev.noarch.rpm SHA-256: 32450079f34967fa1921c112666598ce34dda73c7684ff446ffb1406d9b83129
vdsm-hook-openstacknet-4.19.45-1.el7ev.noarch.rpm SHA-256: 617d8ac1f468403b62ddfb249a459ffa233e5967d849d78f5ccfb4693d4e10db
vdsm-hook-vfio-mdev-4.19.45-1.el7ev.noarch.rpm SHA-256: b9938f9fc40ce5e02a883871e2b49e80b239c49a78868eecada6d0a759db6768
vdsm-hook-vhostmd-4.19.45-1.el7ev.noarch.rpm SHA-256: 584e6eef327a6b042005f3b176dfbeb347eb95a8f01b05fbc8bf2b8309717295
vdsm-hook-vmfex-dev-4.19.45-1.el7ev.noarch.rpm SHA-256: 0bb952497886843041e4d935636a26626cd9608cb35382f544bb84764f7a83e7
vdsm-jsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: de99f34ed47d8616edb680324aa0709325aa67c20e0012f49fb06ab4bce83c43
vdsm-python-4.19.45-1.el7ev.noarch.rpm SHA-256: c7639c34e9f4e36760c20001a13957cf9fd2116bcb0a1b84f8be70186b0ce22c
vdsm-xmlrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: ebe3d866d48a5cefecdb04538fd78d2e49f8ff975b1dce84fc6af04d0942cb21
vdsm-yajsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: b40795c8def6f3c668d6922605d00b915e30153ed6732b610bf506bdd57ffcec

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
vdsm-4.19.45-1.el7ev.src.rpm SHA-256: 4c252f40bb75d543b77cdb730c31755313464f5afb0ca3110b4de86c35ddbc10
ppc64le
vdsm-4.19.45-1.el7ev.ppc64le.rpm SHA-256: e347fa6932c9caa06cb48eeac0d81870283e12de461171f44e1d7d6747e2354d
vdsm-api-4.19.45-1.el7ev.noarch.rpm SHA-256: 0270352e4af77f6b9f02e20912a0c16eec5e244a9aff6b06e9d3d0222dbb206d
vdsm-cli-4.19.45-1.el7ev.noarch.rpm SHA-256: 2a6474d43af4660b799a79c20e1e1aa412956b020e675e690d92ffe0e90b70ed
vdsm-client-4.19.45-1.el7ev.noarch.rpm SHA-256: ef9ee83fac0206613a1c0c5d79f11ee7c4858730e5e23bcf4a5a1306bf7ff295
vdsm-hook-checkips-4.19.45-1.el7ev.ppc64le.rpm SHA-256: 4717c918922b901dd73762e81b648cc0f87fcba7ad9b09be3e0bf83910050ff3
vdsm-hook-ethtool-options-4.19.45-1.el7ev.noarch.rpm SHA-256: 22cdb15067d48d90dacb863cfa6d9be079a4738e1515536575faab157d546165
vdsm-hook-extra-ipv4-addrs-4.19.45-1.el7ev.ppc64le.rpm SHA-256: 575989529f665191949e5edb4bb96d96fa561a9bf50c8faed283da73c07d7be9
vdsm-hook-fcoe-4.19.45-1.el7ev.noarch.rpm SHA-256: 5f4955633e02f47c3e881aeff91b8e70620d63f3ec8161ed2b53f27240030b1b
vdsm-hook-localdisk-4.19.45-1.el7ev.noarch.rpm SHA-256: 1a309056c4ba7c86ad824c71389b24ee3e06061acc8a19eb4a5b3bad7e2e12b7
vdsm-hook-macspoof-4.19.45-1.el7ev.noarch.rpm SHA-256: 4945b087b65b999a5b11ece89e9ec93149efc236b611f137253d1afb5ac1795e
vdsm-hook-nestedvt-4.19.45-1.el7ev.noarch.rpm SHA-256: 32450079f34967fa1921c112666598ce34dda73c7684ff446ffb1406d9b83129
vdsm-hook-openstacknet-4.19.45-1.el7ev.noarch.rpm SHA-256: 617d8ac1f468403b62ddfb249a459ffa233e5967d849d78f5ccfb4693d4e10db
vdsm-hook-vfio-mdev-4.19.45-1.el7ev.noarch.rpm SHA-256: b9938f9fc40ce5e02a883871e2b49e80b239c49a78868eecada6d0a759db6768
vdsm-hook-vhostmd-4.19.45-1.el7ev.noarch.rpm SHA-256: 584e6eef327a6b042005f3b176dfbeb347eb95a8f01b05fbc8bf2b8309717295
vdsm-hook-vmfex-dev-4.19.45-1.el7ev.noarch.rpm SHA-256: 0bb952497886843041e4d935636a26626cd9608cb35382f544bb84764f7a83e7
vdsm-jsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: de99f34ed47d8616edb680324aa0709325aa67c20e0012f49fb06ab4bce83c43
vdsm-python-4.19.45-1.el7ev.noarch.rpm SHA-256: c7639c34e9f4e36760c20001a13957cf9fd2116bcb0a1b84f8be70186b0ce22c
vdsm-xmlrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: ebe3d866d48a5cefecdb04538fd78d2e49f8ff975b1dce84fc6af04d0942cb21
vdsm-yajsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: b40795c8def6f3c668d6922605d00b915e30153ed6732b610bf506bdd57ffcec

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility