- Issued:
- 2018-07-31
- Updated:
- 2018-07-31
RHEA-2018:2319 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.2
Type/Severity
Product Enhancement Advisory
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/2974891
Affected Products
- Red Hat Virtualization 4 x86_64
- Red Hat Virtualization for IBM Power LE 4 ppc64le
Fixes
- BZ - 1598365 - Upgrade vdsm to 4.20.33
- BZ - 1605172 - [downstream clone - 4.2.5] VM was destroyed on destination after successful migration due to missing the 'device' key on the lease device
- BZ - 1607860 - [downstream clone - 4.2.5] vdsm-tool upgrade-networks fails with KeyError: 'defaultRoute'
- BZ - 1607978 - [downstream clone - 4.2.5] Guests not responding periodically in Manager
CVEs
(none)
References
(none)
Red Hat Virtualization 4
| SRPM | |
|---|---|
| vdsm-4.20.35-1.el7ev.src.rpm | SHA-256: 738e7fa03365dc5e393f460c0a64079400f5f34351b617b602b1016954b8d925 |
| x86_64 | |
| vdsm-4.20.35-1.el7ev.x86_64.rpm | SHA-256: 8816a8a95b4296d6ec74170b05d39a86b7838dcc9d10201e0096a01a1a6c8d38 |
| vdsm-api-4.20.35-1.el7ev.noarch.rpm | SHA-256: 0cab521e8e3a23964669278e47f73f086dfc413b1fcab98d64340cbeb3772431 |
| vdsm-client-4.20.35-1.el7ev.noarch.rpm | SHA-256: d509d625b566b296cc17d0beaedc5886364bc67ce4c67c0143d063f099d4b02c |
| vdsm-common-4.20.35-1.el7ev.noarch.rpm | SHA-256: e45ab245649989f15a2e8e806e5bffdbbee308be164a8a69147c0d9e8c44d689 |
| vdsm-gluster-4.20.35-1.el7ev.x86_64.rpm | SHA-256: db93abda9ca8dfa2588eb6ef1f50536c939f51808b627f32e2a81a4045212e8a |
| vdsm-hook-checkips-4.20.35-1.el7ev.x86_64.rpm | SHA-256: d73522abfb319d9c10740616be9653d3883817a5c54ed0bc57da21e203148685 |
| vdsm-hook-cpuflags-4.20.35-1.el7ev.noarch.rpm | SHA-256: 687e47ae56391e6fa0cde2daf6367d0a3440da454e393d98cc16bcc0048e12d5 |
| vdsm-hook-ethtool-options-4.20.35-1.el7ev.noarch.rpm | SHA-256: c7bf705f9c538991b1b8de903afd939c105ad2b1ce69b106f391ca1496ed855f |
| vdsm-hook-extra-ipv4-addrs-4.20.35-1.el7ev.x86_64.rpm | SHA-256: ed9c9bbc6ecf302f8f4393daad31ec4234aa76f603d93a8237da93e1e71b4838 |
| vdsm-hook-fcoe-4.20.35-1.el7ev.noarch.rpm | SHA-256: 4164176e9c5e284ede78fdc5babaec78fc60f6524c56f98e1d157722699750dc |
| vdsm-hook-localdisk-4.20.35-1.el7ev.noarch.rpm | SHA-256: 600bb717b9154c14dd4c7dd760f9b7480ee48b7a73f60ffa2b7d7d7a77addba7 |
| vdsm-hook-macspoof-4.20.35-1.el7ev.noarch.rpm | SHA-256: d111d84bcb475934e17a0aeafffc91c58f67602bc01bb1dba4557d0ec5e66ad5 |
| vdsm-hook-nestedvt-4.20.35-1.el7ev.noarch.rpm | SHA-256: 51eb533b17247f355635551f298dec56a46cc80107f4a4a347ebe05e46df5b0a |
| vdsm-hook-openstacknet-4.20.35-1.el7ev.noarch.rpm | SHA-256: 072ddf4db5c6fdafafb8026d842d86077df04905167e33c46a2b019ee85b2d8c |
| vdsm-hook-vfio-mdev-4.20.35-1.el7ev.noarch.rpm | SHA-256: cc73d9d680174f9df7c8842b924f9f5b26229c0b815ccb6812eb9764258e8d80 |
| vdsm-hook-vhostmd-4.20.35-1.el7ev.noarch.rpm | SHA-256: b9f2f107419df337830ee0acf6d2b8deb39904f904448e9e31745b9e87717962 |
| vdsm-hook-vmfex-dev-4.20.35-1.el7ev.noarch.rpm | SHA-256: b2aee7f2fcf7bfc31420b222e2360f64d7cbb9ca74c6a004ec29df4bb0b291c0 |
| vdsm-http-4.20.35-1.el7ev.noarch.rpm | SHA-256: 0841303d3a680cdb80856b672c40e7a5af8c475d4c3d923bdc10a1376da3111a |
| vdsm-jsonrpc-4.20.35-1.el7ev.noarch.rpm | SHA-256: ec4040593e93c61753e75dae2620227dc9b2c4cad4c81f6a720b7c7e6ae9babd |
| vdsm-network-4.20.35-1.el7ev.x86_64.rpm | SHA-256: 314d0551c2ba96417dfb61d17d8508de83f19e71e872345b6d68a38e3d20bec7 |
| vdsm-python-4.20.35-1.el7ev.noarch.rpm | SHA-256: ec266d22594e38b1a8264e0fc3f83ff22c23edde9ae74d728ddb8e423d38107d |
| vdsm-yajsonrpc-4.20.35-1.el7ev.noarch.rpm | SHA-256: f491bf41f2266dd2a025700ca08e2ca50615349386e155fce530b0ee2b5b4dc4 |
Red Hat Virtualization for IBM Power LE 4
| SRPM | |
|---|---|
| vdsm-4.20.35-1.el7ev.src.rpm | SHA-256: 738e7fa03365dc5e393f460c0a64079400f5f34351b617b602b1016954b8d925 |
| ppc64le | |
| vdsm-4.20.35-1.el7ev.ppc64le.rpm | SHA-256: 18e5d9505e80a31f11a5b568d97e3445a6bc6dd26d398c7d88c87ef7ba243534 |
| vdsm-api-4.20.35-1.el7ev.noarch.rpm | SHA-256: 0cab521e8e3a23964669278e47f73f086dfc413b1fcab98d64340cbeb3772431 |
| vdsm-client-4.20.35-1.el7ev.noarch.rpm | SHA-256: d509d625b566b296cc17d0beaedc5886364bc67ce4c67c0143d063f099d4b02c |
| vdsm-common-4.20.35-1.el7ev.noarch.rpm | SHA-256: e45ab245649989f15a2e8e806e5bffdbbee308be164a8a69147c0d9e8c44d689 |
| vdsm-gluster-4.20.35-1.el7ev.ppc64le.rpm | SHA-256: 07601d991b889e8c8150a5480d0ea15c6466c6dfa6b5325628041901d8a745dc |
| vdsm-hook-checkips-4.20.35-1.el7ev.ppc64le.rpm | SHA-256: 687ffa32221644795dff7f74bf117695239544e020ead37116ef4f8200cb5660 |
| vdsm-hook-cpuflags-4.20.35-1.el7ev.noarch.rpm | SHA-256: 687e47ae56391e6fa0cde2daf6367d0a3440da454e393d98cc16bcc0048e12d5 |
| vdsm-hook-ethtool-options-4.20.35-1.el7ev.noarch.rpm | SHA-256: c7bf705f9c538991b1b8de903afd939c105ad2b1ce69b106f391ca1496ed855f |
| vdsm-hook-extra-ipv4-addrs-4.20.35-1.el7ev.ppc64le.rpm | SHA-256: 6244bfb880b34ae4fbb0bba75f3dc52c356200020102243afd39d92138b9f499 |
| vdsm-hook-fcoe-4.20.35-1.el7ev.noarch.rpm | SHA-256: 4164176e9c5e284ede78fdc5babaec78fc60f6524c56f98e1d157722699750dc |
| vdsm-hook-localdisk-4.20.35-1.el7ev.noarch.rpm | SHA-256: 600bb717b9154c14dd4c7dd760f9b7480ee48b7a73f60ffa2b7d7d7a77addba7 |
| vdsm-hook-macspoof-4.20.35-1.el7ev.noarch.rpm | SHA-256: d111d84bcb475934e17a0aeafffc91c58f67602bc01bb1dba4557d0ec5e66ad5 |
| vdsm-hook-nestedvt-4.20.35-1.el7ev.noarch.rpm | SHA-256: 51eb533b17247f355635551f298dec56a46cc80107f4a4a347ebe05e46df5b0a |
| vdsm-hook-openstacknet-4.20.35-1.el7ev.noarch.rpm | SHA-256: 072ddf4db5c6fdafafb8026d842d86077df04905167e33c46a2b019ee85b2d8c |
| vdsm-hook-vfio-mdev-4.20.35-1.el7ev.noarch.rpm | SHA-256: cc73d9d680174f9df7c8842b924f9f5b26229c0b815ccb6812eb9764258e8d80 |
| vdsm-hook-vhostmd-4.20.35-1.el7ev.noarch.rpm | SHA-256: b9f2f107419df337830ee0acf6d2b8deb39904f904448e9e31745b9e87717962 |
| vdsm-hook-vmfex-dev-4.20.35-1.el7ev.noarch.rpm | SHA-256: b2aee7f2fcf7bfc31420b222e2360f64d7cbb9ca74c6a004ec29df4bb0b291c0 |
| vdsm-http-4.20.35-1.el7ev.noarch.rpm | SHA-256: 0841303d3a680cdb80856b672c40e7a5af8c475d4c3d923bdc10a1376da3111a |
| vdsm-jsonrpc-4.20.35-1.el7ev.noarch.rpm | SHA-256: ec4040593e93c61753e75dae2620227dc9b2c4cad4c81f6a720b7c7e6ae9babd |
| vdsm-network-4.20.35-1.el7ev.ppc64le.rpm | SHA-256: 479094ddb785ff3daa5ee3fa3e5002a08dccbb3d7a1e27a05eb9fe1af330d609 |
| vdsm-python-4.20.35-1.el7ev.noarch.rpm | SHA-256: ec266d22594e38b1a8264e0fc3f83ff22c23edde9ae74d728ddb8e423d38107d |
| vdsm-yajsonrpc-4.20.35-1.el7ev.noarch.rpm | SHA-256: f491bf41f2266dd2a025700ca08e2ca50615349386e155fce530b0ee2b5b4dc4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
