- Issued:
- 2018-06-27
- Updated:
- 2018-06-27
RHEA-2018:2072 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.2
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager
agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, when a virtual machine selected for import contained a floppy, it could prevent the virtual machine from being imported. This is now fixed and floppy drives are ignored during import. (BZ#1576675)
- This release adds a new 'ssl_ciphers' option to VDSM, which allows you to configure available ciphers for encrypted connections (for example, the Manager to VDSM, or VDSM to VDSM). The values of this option conform to OpenSSL standard.
To set this option:
1. Move the host to Maintenance in the Manager.
2. Create a new /etc/vdsm/vdsm.conf.d/99-custom-ciphers.conf file with the following content:
[vars]
ssl_ciphers = <VALUE>
where <VALUE> is one of the values described in the CIPHERS STRINGD section in https://www.openssl.org/docs/man1.0.2/apps/ciphers.html.
3. Restart VDSM.
4. Activate the host in the Manager. (BZ#1585022)
- Previously, the following issue could occur if IO tune settings were enabled:
VDSM uses the domain metadata section to store extra data that is required to configure a VM, but not properly represented on the standard libvirt domain. VDSM tried to store the IO tune settings in this metadata, which was redundant because IO tune already has a proper representation. Furthermore, the implementation of the store operation for the IO tune settings had an implementation bug that prevented the VM from starting successfully.
This has now been fixed. (BZ#1589664)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1576675 - RHV import fails if VM has an unreachable floppy defined
- BZ - 1578763 - [downstream clone - 4.2.4] Unreachable ISO/Export SD prevents hosts from activating
- BZ - 1583228 - [downstream clone - 4.2.4] After updating to current RHV-H, vdsmd consistently fails to start on startup.
- BZ - 1585022 - [downstream clone - 4.2.4] Add option to configure cipher list available for encrypted connections
- BZ - 1585030 - [downstream clone - 4.2.4] RAW-Preallocated disk is converted to RAW-sparse while cloning a VM in file based storage domain
- BZ - 1589664 - [downstream clone - 4.2.4] Cannot start VM with QoS IOPS after host&engine upgrade from 4.1 to 4.2
- BZ - 1591667 - [downstream clone - 4.2.4] Live storage migration completes but leaves volume un-opened.
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.20.31-1.el7ev.src.rpm | SHA-256: adb0ddf1eafef93215e6a193a58b214da074fc1e2ccfe5a30d4590ed6801d3c2 |
x86_64 | |
vdsm-4.20.31-1.el7ev.x86_64.rpm | SHA-256: 61c8d1415310a984402c7121545d147c79bfebb0674e1481657008c46bdd4b8c |
vdsm-api-4.20.31-1.el7ev.noarch.rpm | SHA-256: 275a0d9d6a3a5fe1b3b6f6da59bc9f1356490418f9dd168ed3fcc2cf9ede9903 |
vdsm-client-4.20.31-1.el7ev.noarch.rpm | SHA-256: 18540ced35bbafbf76b3f9a02fa5418ad9602cf69d5fd5518c93755bbb32b48c |
vdsm-common-4.20.31-1.el7ev.noarch.rpm | SHA-256: c57cc36ab5eb8d671f3438c61727c2597d162cf1291f139d60899617cd200596 |
vdsm-gluster-4.20.31-1.el7ev.x86_64.rpm | SHA-256: f92fd7d583ed6045250b7438797d361fd8b8e1db91313b421d11818741d52131 |
vdsm-hook-checkips-4.20.31-1.el7ev.x86_64.rpm | SHA-256: 95a7875a95ef4e6fd5694531549395d789acb7a676bf51a22bbb169a2c5aeb3f |
vdsm-hook-cpuflags-4.20.31-1.el7ev.noarch.rpm | SHA-256: b9078d5d61296188a88e536cbdf688525841802876229912f861277019b5ef0e |
vdsm-hook-ethtool-options-4.20.31-1.el7ev.noarch.rpm | SHA-256: beaaf796a507b4377e9741c9403c6a06a6e90d86b5bc3d3fd5e1de76e9ad0f3d |
vdsm-hook-extra-ipv4-addrs-4.20.31-1.el7ev.x86_64.rpm | SHA-256: 83d8e3c97ed65acfc23516fe0033ddd9d77e611591daeb49c234e0eb9b13f0c7 |
vdsm-hook-fcoe-4.20.31-1.el7ev.noarch.rpm | SHA-256: fb227f08ac13ba501b7cdab37f978383b142f59b01cbb88f143a3541090c168d |
vdsm-hook-localdisk-4.20.31-1.el7ev.noarch.rpm | SHA-256: 1165240fcb3331f42869548222370b5765df9a0d0d99a563ca70ae80f902ba80 |
vdsm-hook-macspoof-4.20.31-1.el7ev.noarch.rpm | SHA-256: 6289188732cd78ea21d4d7abb08a3538163dec0e08a8a58836684f2dbe4e557b |
vdsm-hook-nestedvt-4.20.31-1.el7ev.noarch.rpm | SHA-256: 26dadb52989f615de7bcb1817aaf31c1191ef0ae03a4e8f397143f9e5937ce46 |
vdsm-hook-openstacknet-4.20.31-1.el7ev.noarch.rpm | SHA-256: 2f0f05e24fa2c8ff108fe7f53e60dd9a0dc46b2b50faa4c4a9add90b52b2ef9a |
vdsm-hook-vfio-mdev-4.20.31-1.el7ev.noarch.rpm | SHA-256: c37d207244c4416ad145f77d58c7ffca6a9db58a762255b1f5b6f4ae8deeb4eb |
vdsm-hook-vhostmd-4.20.31-1.el7ev.noarch.rpm | SHA-256: b344d533cd924df13047ff3852ee7853a81b565e22f968babbafbc755cba3a82 |
vdsm-hook-vmfex-dev-4.20.31-1.el7ev.noarch.rpm | SHA-256: 2c7234465a3da4c65bd144dabb1d1901147c1722d0bfe7e4eb5d95e2a5227290 |
vdsm-http-4.20.31-1.el7ev.noarch.rpm | SHA-256: e4f55b6c66ef5fb8b471c0287785d9916ec2d42176a307dcdd1d1eb37975de9c |
vdsm-jsonrpc-4.20.31-1.el7ev.noarch.rpm | SHA-256: 163bce2ca580d31e82091a7ea6c95a2431f1275e25dac444d05c1df6269a6d40 |
vdsm-network-4.20.31-1.el7ev.x86_64.rpm | SHA-256: 1e9b44059b1e3a0c88b8f402bbfbdc22862aeef722b0f06b5b4da0dd4324780a |
vdsm-python-4.20.31-1.el7ev.noarch.rpm | SHA-256: 2e6c805fe93b503ba617106a7d295efd169780a0edefb1adf1a79c3d884ed222 |
vdsm-yajsonrpc-4.20.31-1.el7ev.noarch.rpm | SHA-256: c0cc40fc97e064504e3f2cffebefd33e5bf01c8fe04251ff62adebb17ff36df3 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.20.31-1.el7ev.src.rpm | SHA-256: adb0ddf1eafef93215e6a193a58b214da074fc1e2ccfe5a30d4590ed6801d3c2 |
ppc64le | |
vdsm-4.20.31-1.el7ev.ppc64le.rpm | SHA-256: 000e4b7053af68c28362c5eb22873da8e359bd7b6ff79c21a5fe59c22654682c |
vdsm-api-4.20.31-1.el7ev.noarch.rpm | SHA-256: 275a0d9d6a3a5fe1b3b6f6da59bc9f1356490418f9dd168ed3fcc2cf9ede9903 |
vdsm-client-4.20.31-1.el7ev.noarch.rpm | SHA-256: 18540ced35bbafbf76b3f9a02fa5418ad9602cf69d5fd5518c93755bbb32b48c |
vdsm-common-4.20.31-1.el7ev.noarch.rpm | SHA-256: c57cc36ab5eb8d671f3438c61727c2597d162cf1291f139d60899617cd200596 |
vdsm-gluster-4.20.31-1.el7ev.ppc64le.rpm | SHA-256: f38353faeb98b4c31b6ecb19a989d17519efd6d05f2e4f183af432049d4b8c92 |
vdsm-hook-checkips-4.20.31-1.el7ev.ppc64le.rpm | SHA-256: 30f54e31e32da7786288cab1888973a6a87a69f42a5111ae36bbaa87663f0d89 |
vdsm-hook-cpuflags-4.20.31-1.el7ev.noarch.rpm | SHA-256: b9078d5d61296188a88e536cbdf688525841802876229912f861277019b5ef0e |
vdsm-hook-ethtool-options-4.20.31-1.el7ev.noarch.rpm | SHA-256: beaaf796a507b4377e9741c9403c6a06a6e90d86b5bc3d3fd5e1de76e9ad0f3d |
vdsm-hook-extra-ipv4-addrs-4.20.31-1.el7ev.ppc64le.rpm | SHA-256: 9c736c1d400a2978849e988b94386f4ece3a5b03b36d07284ac8e4b3afa76005 |
vdsm-hook-fcoe-4.20.31-1.el7ev.noarch.rpm | SHA-256: fb227f08ac13ba501b7cdab37f978383b142f59b01cbb88f143a3541090c168d |
vdsm-hook-localdisk-4.20.31-1.el7ev.noarch.rpm | SHA-256: 1165240fcb3331f42869548222370b5765df9a0d0d99a563ca70ae80f902ba80 |
vdsm-hook-macspoof-4.20.31-1.el7ev.noarch.rpm | SHA-256: 6289188732cd78ea21d4d7abb08a3538163dec0e08a8a58836684f2dbe4e557b |
vdsm-hook-nestedvt-4.20.31-1.el7ev.noarch.rpm | SHA-256: 26dadb52989f615de7bcb1817aaf31c1191ef0ae03a4e8f397143f9e5937ce46 |
vdsm-hook-openstacknet-4.20.31-1.el7ev.noarch.rpm | SHA-256: 2f0f05e24fa2c8ff108fe7f53e60dd9a0dc46b2b50faa4c4a9add90b52b2ef9a |
vdsm-hook-vfio-mdev-4.20.31-1.el7ev.noarch.rpm | SHA-256: c37d207244c4416ad145f77d58c7ffca6a9db58a762255b1f5b6f4ae8deeb4eb |
vdsm-hook-vhostmd-4.20.31-1.el7ev.noarch.rpm | SHA-256: b344d533cd924df13047ff3852ee7853a81b565e22f968babbafbc755cba3a82 |
vdsm-hook-vmfex-dev-4.20.31-1.el7ev.noarch.rpm | SHA-256: 2c7234465a3da4c65bd144dabb1d1901147c1722d0bfe7e4eb5d95e2a5227290 |
vdsm-http-4.20.31-1.el7ev.noarch.rpm | SHA-256: e4f55b6c66ef5fb8b471c0287785d9916ec2d42176a307dcdd1d1eb37975de9c |
vdsm-jsonrpc-4.20.31-1.el7ev.noarch.rpm | SHA-256: 163bce2ca580d31e82091a7ea6c95a2431f1275e25dac444d05c1df6269a6d40 |
vdsm-network-4.20.31-1.el7ev.ppc64le.rpm | SHA-256: 888cf4ee3da5aab20f6b1f49403b058f65d7aceb254f6d68765452d1c80a3db8 |
vdsm-python-4.20.31-1.el7ev.noarch.rpm | SHA-256: 2e6c805fe93b503ba617106a7d295efd169780a0edefb1adf1a79c3d884ed222 |
vdsm-yajsonrpc-4.20.31-1.el7ev.noarch.rpm | SHA-256: c0cc40fc97e064504e3f2cffebefd33e5bf01c8fe04251ff62adebb17ff36df3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.