Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2018:2319 - Product Enhancement Advisory
Issued:
2018-07-31
Updated:
2018-07-31

RHEA-2018:2319 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

VDSM bug fix and enhancement update 4.2

Type/Severity

Product Enhancement Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated vdsm packages that fix several bugs and add various enhancements are now available.

Description

VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le

Fixes

  • BZ - 1598365 - Upgrade vdsm to 4.20.33
  • BZ - 1605172 - [downstream clone - 4.2.5] VM was destroyed on destination after successful migration due to missing the 'device' key on the lease device
  • BZ - 1607860 - [downstream clone - 4.2.5] vdsm-tool upgrade-networks fails with KeyError: 'defaultRoute'
  • BZ - 1607978 - [downstream clone - 4.2.5] Guests not responding periodically in Manager

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
vdsm-4.20.35-1.el7ev.src.rpm SHA-256: 738e7fa03365dc5e393f460c0a64079400f5f34351b617b602b1016954b8d925
x86_64
vdsm-4.20.35-1.el7ev.x86_64.rpm SHA-256: 8816a8a95b4296d6ec74170b05d39a86b7838dcc9d10201e0096a01a1a6c8d38
vdsm-api-4.20.35-1.el7ev.noarch.rpm SHA-256: 0cab521e8e3a23964669278e47f73f086dfc413b1fcab98d64340cbeb3772431
vdsm-client-4.20.35-1.el7ev.noarch.rpm SHA-256: d509d625b566b296cc17d0beaedc5886364bc67ce4c67c0143d063f099d4b02c
vdsm-common-4.20.35-1.el7ev.noarch.rpm SHA-256: e45ab245649989f15a2e8e806e5bffdbbee308be164a8a69147c0d9e8c44d689
vdsm-gluster-4.20.35-1.el7ev.x86_64.rpm SHA-256: db93abda9ca8dfa2588eb6ef1f50536c939f51808b627f32e2a81a4045212e8a
vdsm-hook-checkips-4.20.35-1.el7ev.x86_64.rpm SHA-256: d73522abfb319d9c10740616be9653d3883817a5c54ed0bc57da21e203148685
vdsm-hook-cpuflags-4.20.35-1.el7ev.noarch.rpm SHA-256: 687e47ae56391e6fa0cde2daf6367d0a3440da454e393d98cc16bcc0048e12d5
vdsm-hook-ethtool-options-4.20.35-1.el7ev.noarch.rpm SHA-256: c7bf705f9c538991b1b8de903afd939c105ad2b1ce69b106f391ca1496ed855f
vdsm-hook-extra-ipv4-addrs-4.20.35-1.el7ev.x86_64.rpm SHA-256: ed9c9bbc6ecf302f8f4393daad31ec4234aa76f603d93a8237da93e1e71b4838
vdsm-hook-fcoe-4.20.35-1.el7ev.noarch.rpm SHA-256: 4164176e9c5e284ede78fdc5babaec78fc60f6524c56f98e1d157722699750dc
vdsm-hook-localdisk-4.20.35-1.el7ev.noarch.rpm SHA-256: 600bb717b9154c14dd4c7dd760f9b7480ee48b7a73f60ffa2b7d7d7a77addba7
vdsm-hook-macspoof-4.20.35-1.el7ev.noarch.rpm SHA-256: d111d84bcb475934e17a0aeafffc91c58f67602bc01bb1dba4557d0ec5e66ad5
vdsm-hook-nestedvt-4.20.35-1.el7ev.noarch.rpm SHA-256: 51eb533b17247f355635551f298dec56a46cc80107f4a4a347ebe05e46df5b0a
vdsm-hook-openstacknet-4.20.35-1.el7ev.noarch.rpm SHA-256: 072ddf4db5c6fdafafb8026d842d86077df04905167e33c46a2b019ee85b2d8c
vdsm-hook-vfio-mdev-4.20.35-1.el7ev.noarch.rpm SHA-256: cc73d9d680174f9df7c8842b924f9f5b26229c0b815ccb6812eb9764258e8d80
vdsm-hook-vhostmd-4.20.35-1.el7ev.noarch.rpm SHA-256: b9f2f107419df337830ee0acf6d2b8deb39904f904448e9e31745b9e87717962
vdsm-hook-vmfex-dev-4.20.35-1.el7ev.noarch.rpm SHA-256: b2aee7f2fcf7bfc31420b222e2360f64d7cbb9ca74c6a004ec29df4bb0b291c0
vdsm-http-4.20.35-1.el7ev.noarch.rpm SHA-256: 0841303d3a680cdb80856b672c40e7a5af8c475d4c3d923bdc10a1376da3111a
vdsm-jsonrpc-4.20.35-1.el7ev.noarch.rpm SHA-256: ec4040593e93c61753e75dae2620227dc9b2c4cad4c81f6a720b7c7e6ae9babd
vdsm-network-4.20.35-1.el7ev.x86_64.rpm SHA-256: 314d0551c2ba96417dfb61d17d8508de83f19e71e872345b6d68a38e3d20bec7
vdsm-python-4.20.35-1.el7ev.noarch.rpm SHA-256: ec266d22594e38b1a8264e0fc3f83ff22c23edde9ae74d728ddb8e423d38107d
vdsm-yajsonrpc-4.20.35-1.el7ev.noarch.rpm SHA-256: f491bf41f2266dd2a025700ca08e2ca50615349386e155fce530b0ee2b5b4dc4

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
vdsm-4.20.35-1.el7ev.src.rpm SHA-256: 738e7fa03365dc5e393f460c0a64079400f5f34351b617b602b1016954b8d925
ppc64le
vdsm-4.20.35-1.el7ev.ppc64le.rpm SHA-256: 18e5d9505e80a31f11a5b568d97e3445a6bc6dd26d398c7d88c87ef7ba243534
vdsm-api-4.20.35-1.el7ev.noarch.rpm SHA-256: 0cab521e8e3a23964669278e47f73f086dfc413b1fcab98d64340cbeb3772431
vdsm-client-4.20.35-1.el7ev.noarch.rpm SHA-256: d509d625b566b296cc17d0beaedc5886364bc67ce4c67c0143d063f099d4b02c
vdsm-common-4.20.35-1.el7ev.noarch.rpm SHA-256: e45ab245649989f15a2e8e806e5bffdbbee308be164a8a69147c0d9e8c44d689
vdsm-gluster-4.20.35-1.el7ev.ppc64le.rpm SHA-256: 07601d991b889e8c8150a5480d0ea15c6466c6dfa6b5325628041901d8a745dc
vdsm-hook-checkips-4.20.35-1.el7ev.ppc64le.rpm SHA-256: 687ffa32221644795dff7f74bf117695239544e020ead37116ef4f8200cb5660
vdsm-hook-cpuflags-4.20.35-1.el7ev.noarch.rpm SHA-256: 687e47ae56391e6fa0cde2daf6367d0a3440da454e393d98cc16bcc0048e12d5
vdsm-hook-ethtool-options-4.20.35-1.el7ev.noarch.rpm SHA-256: c7bf705f9c538991b1b8de903afd939c105ad2b1ce69b106f391ca1496ed855f
vdsm-hook-extra-ipv4-addrs-4.20.35-1.el7ev.ppc64le.rpm SHA-256: 6244bfb880b34ae4fbb0bba75f3dc52c356200020102243afd39d92138b9f499
vdsm-hook-fcoe-4.20.35-1.el7ev.noarch.rpm SHA-256: 4164176e9c5e284ede78fdc5babaec78fc60f6524c56f98e1d157722699750dc
vdsm-hook-localdisk-4.20.35-1.el7ev.noarch.rpm SHA-256: 600bb717b9154c14dd4c7dd760f9b7480ee48b7a73f60ffa2b7d7d7a77addba7
vdsm-hook-macspoof-4.20.35-1.el7ev.noarch.rpm SHA-256: d111d84bcb475934e17a0aeafffc91c58f67602bc01bb1dba4557d0ec5e66ad5
vdsm-hook-nestedvt-4.20.35-1.el7ev.noarch.rpm SHA-256: 51eb533b17247f355635551f298dec56a46cc80107f4a4a347ebe05e46df5b0a
vdsm-hook-openstacknet-4.20.35-1.el7ev.noarch.rpm SHA-256: 072ddf4db5c6fdafafb8026d842d86077df04905167e33c46a2b019ee85b2d8c
vdsm-hook-vfio-mdev-4.20.35-1.el7ev.noarch.rpm SHA-256: cc73d9d680174f9df7c8842b924f9f5b26229c0b815ccb6812eb9764258e8d80
vdsm-hook-vhostmd-4.20.35-1.el7ev.noarch.rpm SHA-256: b9f2f107419df337830ee0acf6d2b8deb39904f904448e9e31745b9e87717962
vdsm-hook-vmfex-dev-4.20.35-1.el7ev.noarch.rpm SHA-256: b2aee7f2fcf7bfc31420b222e2360f64d7cbb9ca74c6a004ec29df4bb0b291c0
vdsm-http-4.20.35-1.el7ev.noarch.rpm SHA-256: 0841303d3a680cdb80856b672c40e7a5af8c475d4c3d923bdc10a1376da3111a
vdsm-jsonrpc-4.20.35-1.el7ev.noarch.rpm SHA-256: ec4040593e93c61753e75dae2620227dc9b2c4cad4c81f6a720b7c7e6ae9babd
vdsm-network-4.20.35-1.el7ev.ppc64le.rpm SHA-256: 479094ddb785ff3daa5ee3fa3e5002a08dccbb3d7a1e27a05eb9fe1af330d609
vdsm-python-4.20.35-1.el7ev.noarch.rpm SHA-256: ec266d22594e38b1a8264e0fc3f83ff22c23edde9ae74d728ddb8e423d38107d
vdsm-yajsonrpc-4.20.35-1.el7ev.noarch.rpm SHA-256: f491bf41f2266dd2a025700ca08e2ca50615349386e155fce530b0ee2b5b4dc4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Policy effective July 1st, 2023.
Red Hat Summit Red Hat Summit
Twitter