Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Application Foundations
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2018:0136 - Product Enhancement Advisory
Issued:
2018-01-24
Updated:
2018-01-24

RHEA-2018:0136 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

VDSM bug fix and enhancement update 4.1.9

Type/Severity

Product Enhancement Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated vdsm packages that fix several bugs and add various enhancements are now available.

Description

VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.

Changes to the vdsm component:

  • Currently, LVM scans and activates raw volumes during boot. Then it scans and activates guest logical volumes created inside a guest on top of the raw volumes. It also scans and activates guest logical volumes inside LUNs which are not part of a Red Hat Virtualization storage domain. As a result, there may be thousands of active logical volumes on a host, which should not be active. This leads to very slow boot time and may lead to data corruption later if a logical volume active on the host was extended on another host.

To avoid this, you can configure an LVM filter using the "vdsm-tool config-lvm-filter" command. The LVM filter prevents scanning and activation of logical volumes not required by the host, which improves boot time. (BZ#1524500)

  • Previously, VDSM was accessing NFS storage directly when performing lease operations. A bug in Python could cause the entire VDSM process to hang if the NFS storage was not responsive. VDSM could become unkillable (D state) for many hours, until the host was rebooted. Now, VDSM uses an external process to access NFS storage, so it can continue to function correctly even if the NFS storage becomes non-responsive, and can be restarted if needed. (BZ#1527827)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le

Fixes

  • BZ - 1524500 - [downstream clone - 4.1.9] Guest LVs created on raw volumes are auto activated on the hypervisor with FC storage (lvm filter?)
  • BZ - 1527827 - [downstream clone - 4.1.9] Entire vdsm process hang during when formatting xlease volume on NFS storage domain
  • BZ - 1530630 - [downstream clone - 4.1.9] vdsm-tool remove-config does not revert changes

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
vdsm-4.19.45-1.el7ev.src.rpm SHA-256: 4c252f40bb75d543b77cdb730c31755313464f5afb0ca3110b4de86c35ddbc10
x86_64
vdsm-4.19.45-1.el7ev.x86_64.rpm SHA-256: 4ff29119a0bddaf3b7fb80a0004e1354b2af3bffecc4b2b70b20cc28732ed887
vdsm-api-4.19.45-1.el7ev.noarch.rpm SHA-256: 0270352e4af77f6b9f02e20912a0c16eec5e244a9aff6b06e9d3d0222dbb206d
vdsm-cli-4.19.45-1.el7ev.noarch.rpm SHA-256: 2a6474d43af4660b799a79c20e1e1aa412956b020e675e690d92ffe0e90b70ed
vdsm-client-4.19.45-1.el7ev.noarch.rpm SHA-256: ef9ee83fac0206613a1c0c5d79f11ee7c4858730e5e23bcf4a5a1306bf7ff295
vdsm-gluster-4.19.45-1.el7ev.noarch.rpm SHA-256: 503560757bc99bb95c896629743c7db5362445f4d65f0b0a9fb238043cf7db9e
vdsm-hook-checkips-4.19.45-1.el7ev.x86_64.rpm SHA-256: 93bf2d4dee477c6b728aa8f9a87217187e54f54beab7886f0e1dea0b0fbbdc89
vdsm-hook-ethtool-options-4.19.45-1.el7ev.noarch.rpm SHA-256: 22cdb15067d48d90dacb863cfa6d9be079a4738e1515536575faab157d546165
vdsm-hook-extra-ipv4-addrs-4.19.45-1.el7ev.x86_64.rpm SHA-256: 0cd2981e4e31d965b77d54e65af9a6854572a05a515a6311efec0e817dcd2ce8
vdsm-hook-fcoe-4.19.45-1.el7ev.noarch.rpm SHA-256: 5f4955633e02f47c3e881aeff91b8e70620d63f3ec8161ed2b53f27240030b1b
vdsm-hook-localdisk-4.19.45-1.el7ev.noarch.rpm SHA-256: 1a309056c4ba7c86ad824c71389b24ee3e06061acc8a19eb4a5b3bad7e2e12b7
vdsm-hook-macspoof-4.19.45-1.el7ev.noarch.rpm SHA-256: 4945b087b65b999a5b11ece89e9ec93149efc236b611f137253d1afb5ac1795e
vdsm-hook-nestedvt-4.19.45-1.el7ev.noarch.rpm SHA-256: 32450079f34967fa1921c112666598ce34dda73c7684ff446ffb1406d9b83129
vdsm-hook-openstacknet-4.19.45-1.el7ev.noarch.rpm SHA-256: 617d8ac1f468403b62ddfb249a459ffa233e5967d849d78f5ccfb4693d4e10db
vdsm-hook-vfio-mdev-4.19.45-1.el7ev.noarch.rpm SHA-256: b9938f9fc40ce5e02a883871e2b49e80b239c49a78868eecada6d0a759db6768
vdsm-hook-vhostmd-4.19.45-1.el7ev.noarch.rpm SHA-256: 584e6eef327a6b042005f3b176dfbeb347eb95a8f01b05fbc8bf2b8309717295
vdsm-hook-vmfex-dev-4.19.45-1.el7ev.noarch.rpm SHA-256: 0bb952497886843041e4d935636a26626cd9608cb35382f544bb84764f7a83e7
vdsm-jsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: de99f34ed47d8616edb680324aa0709325aa67c20e0012f49fb06ab4bce83c43
vdsm-python-4.19.45-1.el7ev.noarch.rpm SHA-256: c7639c34e9f4e36760c20001a13957cf9fd2116bcb0a1b84f8be70186b0ce22c
vdsm-xmlrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: ebe3d866d48a5cefecdb04538fd78d2e49f8ff975b1dce84fc6af04d0942cb21
vdsm-yajsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: b40795c8def6f3c668d6922605d00b915e30153ed6732b610bf506bdd57ffcec

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
vdsm-4.19.45-1.el7ev.src.rpm SHA-256: 4c252f40bb75d543b77cdb730c31755313464f5afb0ca3110b4de86c35ddbc10
ppc64le
vdsm-4.19.45-1.el7ev.ppc64le.rpm SHA-256: e347fa6932c9caa06cb48eeac0d81870283e12de461171f44e1d7d6747e2354d
vdsm-api-4.19.45-1.el7ev.noarch.rpm SHA-256: 0270352e4af77f6b9f02e20912a0c16eec5e244a9aff6b06e9d3d0222dbb206d
vdsm-cli-4.19.45-1.el7ev.noarch.rpm SHA-256: 2a6474d43af4660b799a79c20e1e1aa412956b020e675e690d92ffe0e90b70ed
vdsm-client-4.19.45-1.el7ev.noarch.rpm SHA-256: ef9ee83fac0206613a1c0c5d79f11ee7c4858730e5e23bcf4a5a1306bf7ff295
vdsm-hook-checkips-4.19.45-1.el7ev.ppc64le.rpm SHA-256: 4717c918922b901dd73762e81b648cc0f87fcba7ad9b09be3e0bf83910050ff3
vdsm-hook-ethtool-options-4.19.45-1.el7ev.noarch.rpm SHA-256: 22cdb15067d48d90dacb863cfa6d9be079a4738e1515536575faab157d546165
vdsm-hook-extra-ipv4-addrs-4.19.45-1.el7ev.ppc64le.rpm SHA-256: 575989529f665191949e5edb4bb96d96fa561a9bf50c8faed283da73c07d7be9
vdsm-hook-fcoe-4.19.45-1.el7ev.noarch.rpm SHA-256: 5f4955633e02f47c3e881aeff91b8e70620d63f3ec8161ed2b53f27240030b1b
vdsm-hook-localdisk-4.19.45-1.el7ev.noarch.rpm SHA-256: 1a309056c4ba7c86ad824c71389b24ee3e06061acc8a19eb4a5b3bad7e2e12b7
vdsm-hook-macspoof-4.19.45-1.el7ev.noarch.rpm SHA-256: 4945b087b65b999a5b11ece89e9ec93149efc236b611f137253d1afb5ac1795e
vdsm-hook-nestedvt-4.19.45-1.el7ev.noarch.rpm SHA-256: 32450079f34967fa1921c112666598ce34dda73c7684ff446ffb1406d9b83129
vdsm-hook-openstacknet-4.19.45-1.el7ev.noarch.rpm SHA-256: 617d8ac1f468403b62ddfb249a459ffa233e5967d849d78f5ccfb4693d4e10db
vdsm-hook-vfio-mdev-4.19.45-1.el7ev.noarch.rpm SHA-256: b9938f9fc40ce5e02a883871e2b49e80b239c49a78868eecada6d0a759db6768
vdsm-hook-vhostmd-4.19.45-1.el7ev.noarch.rpm SHA-256: 584e6eef327a6b042005f3b176dfbeb347eb95a8f01b05fbc8bf2b8309717295
vdsm-hook-vmfex-dev-4.19.45-1.el7ev.noarch.rpm SHA-256: 0bb952497886843041e4d935636a26626cd9608cb35382f544bb84764f7a83e7
vdsm-jsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: de99f34ed47d8616edb680324aa0709325aa67c20e0012f49fb06ab4bce83c43
vdsm-python-4.19.45-1.el7ev.noarch.rpm SHA-256: c7639c34e9f4e36760c20001a13957cf9fd2116bcb0a1b84f8be70186b0ce22c
vdsm-xmlrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: ebe3d866d48a5cefecdb04538fd78d2e49f8ff975b1dce84fc6af04d0942cb21
vdsm-yajsonrpc-4.19.45-1.el7ev.noarch.rpm SHA-256: b40795c8def6f3c668d6922605d00b915e30153ed6732b610bf506bdd57ffcec

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Policy effective July 1st, 2023.
Red Hat Summit
Twitter