Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2018:3478 - Product Enhancement Advisory
Issued:
2018-11-05
Updated:
2018-11-05

RHEA-2018:3478 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

VDSM bug fix and enhancement update 4.2

Type/Severity

Product Enhancement Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated vdsm packages that fix several bugs and add various enhancements are now available.

Description

VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.

Changes to the vdsm component:

  • In certain cases, when a VM does not successfully complete migration to its destination host, it still boots and runs on the destination host, without VDSM managing it properly. This unmanaged VM can cause split-brain. With this release, a migrating VM is always prevented from starting if the VM setup fails on the destination host. (BZ#1627289)
  • Large snapshots can result in long pauses of a VM that can affect the accuracy of the System Time, upon which time stamps and other time related functions depend. Guest Time Synchronization enables synchronization of the VM’s System Time during the creation of snapshots when enabled. When this feature is enabled and the Guest Agent is running, the VDSM process on the Host attempts to synchronize the System Time of the VM with the Host’s System Time when snapshots are completed and the VM is un-paused. To turn on Guest Time Synchronization for snapshots, use the time_sync_snapshot_enable option. For synchronizing the VM’s System Time during abnormal scenarios that may cause the VM to pause, you can enable the time_sync_cont_enable option. By default, these features are disabled for backward compatibility. (BZ#1620573)
  • Copying volumes to preallocated disks is slower than it can be, and does not make optimal use of available network resources. In this release, qemu-img uses out of order writing. As a result, write operations, such as importing, moving or copying large disks to preallocated storage, can be up to 6 times faster. (BZ#1621211)
  • When a VM is running, the disk size of the virtual machine should be no larger than was required during the initial allocation of disk space, unless you specify pre-allocation. Previously, when you set thin provisioning for importing a KVM-based VM into a Red Hat Virtualizaton environment, the disk size of the VM within the Red Hat Virtualization storage domain was inflated to the volume size or larger, even when the original KVM-based VM was much smaller.

KVM Sparseness is now supported so that when you import a virtual machine with thin provisioning enabled into a Red Hat Virtualization environment, the disk size of the original virtual machine image is preserved. (BZ#1628477)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le

Fixes

  • BZ - 1620573 - [downstream clone - 4.2.7] [RFE] Time sync in VM after resuming from PAUSE state
  • BZ - 1621211 - [downstream clone - 4.2.7] qemu-img: slow disk move/clone/import
  • BZ - 1627289 - [downstream clone - 4.2.7] startUnderlyingVm fails with exception resulting in split-brain
  • BZ - 1628477 - [downstream clone - 4.2.7] After importing KVM VM the actual size is bigger than the virtual size
  • BZ - 1635687 - [downstream clone - 4.2.7] Guest agent info is not reported with latest vdsm

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
vdsm-4.20.43-1.el7ev.src.rpm SHA-256: 20c2b0191e1b3788d06ad1944a7d3562adb42138023f222bba7a0648714d6f6c
x86_64
vdsm-4.20.43-1.el7ev.x86_64.rpm SHA-256: 668032e4275e8184dde1ffdfeced725eb4a7f4d839dceec763d52dcd111d58c0
vdsm-api-4.20.43-1.el7ev.noarch.rpm SHA-256: d7b9e4a5011f404e9c8a2148cb3f4e3ec144c37a2f35e2c873978e5e2aa12548
vdsm-client-4.20.43-1.el7ev.noarch.rpm SHA-256: 74b2c79ca942d1e6dbfae0b6f4aeee39a13b9bbbf150fde24fedc55c35026818
vdsm-common-4.20.43-1.el7ev.noarch.rpm SHA-256: f5f8bac692823f82bdbcb0b0b3852073945574c50c5037c1de3595e29f42cca2
vdsm-gluster-4.20.43-1.el7ev.x86_64.rpm SHA-256: 5496be697dc3dd760e85c6bd4c64fb339ec9da209e68d0b4dc23b2bb772867fd
vdsm-hook-checkips-4.20.43-1.el7ev.x86_64.rpm SHA-256: eae6b93e74d2a6296b73a84a805d42d3529341832982d4a60e8f272052df58f8
vdsm-hook-cpuflags-4.20.43-1.el7ev.noarch.rpm SHA-256: dbb1e89e7cb7e4d820f86ed84a07c024218fbf7482161faf1fb275164d8b761a
vdsm-hook-ethtool-options-4.20.43-1.el7ev.noarch.rpm SHA-256: b0d10100a95e6d90f20a04dc214275b124f9afb925f969b5e8723dda3542c8fc
vdsm-hook-extra-ipv4-addrs-4.20.43-1.el7ev.x86_64.rpm SHA-256: 18812f6d36e7083f0cfd6a3e3ff3ddab6ac5e7debe956d1951c2f67ae4597a80
vdsm-hook-fcoe-4.20.43-1.el7ev.noarch.rpm SHA-256: 7c3e2aa78be114b76c6454487bc8d481fd04ae72a506f597259b3ee6876fbdae
vdsm-hook-localdisk-4.20.43-1.el7ev.noarch.rpm SHA-256: 7b6d680b56f492b55b0f81024fc88be636a09cdb74d9e2493a695b3aa47abdfd
vdsm-hook-macspoof-4.20.43-1.el7ev.noarch.rpm SHA-256: 5e8f8a61586a9b148b2132581dc0239de4ae4cc02367b186c7de26d429441d41
vdsm-hook-nestedvt-4.20.43-1.el7ev.noarch.rpm SHA-256: 35b170c566e43de9d1060b5da022cec72228075069fa089eee348c46d34cc030
vdsm-hook-openstacknet-4.20.43-1.el7ev.noarch.rpm SHA-256: 4b3a36ab2c9fcc92a63bb63fe0466f0333a323ad03fe888b0d246ebe86a46f79
vdsm-hook-vhostmd-4.20.43-1.el7ev.noarch.rpm SHA-256: 6e26c25f8b9aa1010d43e6f27ba1214dac2e64cad5a5aaf30dff008d88e625ee
vdsm-hook-vmfex-dev-4.20.43-1.el7ev.noarch.rpm SHA-256: c3a0da29c2e08c810d9c66e1107a25a2896f71f058be4fdf162a98ef6f620255
vdsm-http-4.20.43-1.el7ev.noarch.rpm SHA-256: 40ea789916eba091446989ff6a884671153c312b89056bc07acbe4fc6b87b673
vdsm-jsonrpc-4.20.43-1.el7ev.noarch.rpm SHA-256: 675f5d48be86a8a0172d0f81e8e76aace12683939935dce55a59624073c28ffb
vdsm-network-4.20.43-1.el7ev.x86_64.rpm SHA-256: 98ab42026222cd88639c1126f0776cf7b12a25658366578da7bcae10f63d7f49
vdsm-python-4.20.43-1.el7ev.noarch.rpm SHA-256: a40447e85abc3eef877c09fde6922561055a46f739c5e02bb3d1865a4d7e246a
vdsm-yajsonrpc-4.20.43-1.el7ev.noarch.rpm SHA-256: a164631ce9099bb002b86a0b48c5ed3540919d68b9d89509f265ffa219f01d16

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
vdsm-4.20.43-1.el7ev.src.rpm SHA-256: 20c2b0191e1b3788d06ad1944a7d3562adb42138023f222bba7a0648714d6f6c
ppc64le
vdsm-4.20.43-1.el7ev.ppc64le.rpm SHA-256: 93cd12f6d48cb20ec9596ef512846619463dd925658a19bbbf69010686b2282e
vdsm-4.20.43-1.el7ev.ppc64le.rpm SHA-256: 93cd12f6d48cb20ec9596ef512846619463dd925658a19bbbf69010686b2282e
vdsm-api-4.20.43-1.el7ev.noarch.rpm SHA-256: d7b9e4a5011f404e9c8a2148cb3f4e3ec144c37a2f35e2c873978e5e2aa12548
vdsm-api-4.20.43-1.el7ev.noarch.rpm SHA-256: d7b9e4a5011f404e9c8a2148cb3f4e3ec144c37a2f35e2c873978e5e2aa12548
vdsm-client-4.20.43-1.el7ev.noarch.rpm SHA-256: 74b2c79ca942d1e6dbfae0b6f4aeee39a13b9bbbf150fde24fedc55c35026818
vdsm-client-4.20.43-1.el7ev.noarch.rpm SHA-256: 74b2c79ca942d1e6dbfae0b6f4aeee39a13b9bbbf150fde24fedc55c35026818
vdsm-common-4.20.43-1.el7ev.noarch.rpm SHA-256: f5f8bac692823f82bdbcb0b0b3852073945574c50c5037c1de3595e29f42cca2
vdsm-common-4.20.43-1.el7ev.noarch.rpm SHA-256: f5f8bac692823f82bdbcb0b0b3852073945574c50c5037c1de3595e29f42cca2
vdsm-gluster-4.20.43-1.el7ev.ppc64le.rpm SHA-256: 0b22153ffebfb10dbd156f36504c880c553687e533bfa15b7fbe360e7e5b1a70
vdsm-gluster-4.20.43-1.el7ev.ppc64le.rpm SHA-256: 0b22153ffebfb10dbd156f36504c880c553687e533bfa15b7fbe360e7e5b1a70
vdsm-hook-checkips-4.20.43-1.el7ev.ppc64le.rpm SHA-256: dec54ca66ffe8fbc2363c84ff7ec49d03dfa22b45c6279582124ff6a22ec2a41
vdsm-hook-checkips-4.20.43-1.el7ev.ppc64le.rpm SHA-256: dec54ca66ffe8fbc2363c84ff7ec49d03dfa22b45c6279582124ff6a22ec2a41
vdsm-hook-cpuflags-4.20.43-1.el7ev.noarch.rpm SHA-256: dbb1e89e7cb7e4d820f86ed84a07c024218fbf7482161faf1fb275164d8b761a
vdsm-hook-cpuflags-4.20.43-1.el7ev.noarch.rpm SHA-256: dbb1e89e7cb7e4d820f86ed84a07c024218fbf7482161faf1fb275164d8b761a
vdsm-hook-ethtool-options-4.20.43-1.el7ev.noarch.rpm SHA-256: b0d10100a95e6d90f20a04dc214275b124f9afb925f969b5e8723dda3542c8fc
vdsm-hook-ethtool-options-4.20.43-1.el7ev.noarch.rpm SHA-256: b0d10100a95e6d90f20a04dc214275b124f9afb925f969b5e8723dda3542c8fc
vdsm-hook-extra-ipv4-addrs-4.20.43-1.el7ev.ppc64le.rpm SHA-256: 856ac15e8d94741f1759a190ba3c397cd995e4d747402311581512af828e0c7d
vdsm-hook-extra-ipv4-addrs-4.20.43-1.el7ev.ppc64le.rpm SHA-256: 856ac15e8d94741f1759a190ba3c397cd995e4d747402311581512af828e0c7d
vdsm-hook-fcoe-4.20.43-1.el7ev.noarch.rpm SHA-256: 7c3e2aa78be114b76c6454487bc8d481fd04ae72a506f597259b3ee6876fbdae
vdsm-hook-fcoe-4.20.43-1.el7ev.noarch.rpm SHA-256: 7c3e2aa78be114b76c6454487bc8d481fd04ae72a506f597259b3ee6876fbdae
vdsm-hook-localdisk-4.20.43-1.el7ev.noarch.rpm SHA-256: 7b6d680b56f492b55b0f81024fc88be636a09cdb74d9e2493a695b3aa47abdfd
vdsm-hook-localdisk-4.20.43-1.el7ev.noarch.rpm SHA-256: 7b6d680b56f492b55b0f81024fc88be636a09cdb74d9e2493a695b3aa47abdfd
vdsm-hook-macspoof-4.20.43-1.el7ev.noarch.rpm SHA-256: 5e8f8a61586a9b148b2132581dc0239de4ae4cc02367b186c7de26d429441d41
vdsm-hook-macspoof-4.20.43-1.el7ev.noarch.rpm SHA-256: 5e8f8a61586a9b148b2132581dc0239de4ae4cc02367b186c7de26d429441d41
vdsm-hook-nestedvt-4.20.43-1.el7ev.noarch.rpm SHA-256: 35b170c566e43de9d1060b5da022cec72228075069fa089eee348c46d34cc030
vdsm-hook-nestedvt-4.20.43-1.el7ev.noarch.rpm SHA-256: 35b170c566e43de9d1060b5da022cec72228075069fa089eee348c46d34cc030
vdsm-hook-openstacknet-4.20.43-1.el7ev.noarch.rpm SHA-256: 4b3a36ab2c9fcc92a63bb63fe0466f0333a323ad03fe888b0d246ebe86a46f79
vdsm-hook-openstacknet-4.20.43-1.el7ev.noarch.rpm SHA-256: 4b3a36ab2c9fcc92a63bb63fe0466f0333a323ad03fe888b0d246ebe86a46f79
vdsm-hook-vhostmd-4.20.43-1.el7ev.noarch.rpm SHA-256: 6e26c25f8b9aa1010d43e6f27ba1214dac2e64cad5a5aaf30dff008d88e625ee
vdsm-hook-vhostmd-4.20.43-1.el7ev.noarch.rpm SHA-256: 6e26c25f8b9aa1010d43e6f27ba1214dac2e64cad5a5aaf30dff008d88e625ee
vdsm-hook-vmfex-dev-4.20.43-1.el7ev.noarch.rpm SHA-256: c3a0da29c2e08c810d9c66e1107a25a2896f71f058be4fdf162a98ef6f620255
vdsm-hook-vmfex-dev-4.20.43-1.el7ev.noarch.rpm SHA-256: c3a0da29c2e08c810d9c66e1107a25a2896f71f058be4fdf162a98ef6f620255
vdsm-http-4.20.43-1.el7ev.noarch.rpm SHA-256: 40ea789916eba091446989ff6a884671153c312b89056bc07acbe4fc6b87b673
vdsm-http-4.20.43-1.el7ev.noarch.rpm SHA-256: 40ea789916eba091446989ff6a884671153c312b89056bc07acbe4fc6b87b673
vdsm-jsonrpc-4.20.43-1.el7ev.noarch.rpm SHA-256: 675f5d48be86a8a0172d0f81e8e76aace12683939935dce55a59624073c28ffb
vdsm-jsonrpc-4.20.43-1.el7ev.noarch.rpm SHA-256: 675f5d48be86a8a0172d0f81e8e76aace12683939935dce55a59624073c28ffb
vdsm-network-4.20.43-1.el7ev.ppc64le.rpm SHA-256: e8024b370eccf2760ba9017869094f6f6851a999401a1ede17fe93e9ae9b5325
vdsm-network-4.20.43-1.el7ev.ppc64le.rpm SHA-256: e8024b370eccf2760ba9017869094f6f6851a999401a1ede17fe93e9ae9b5325
vdsm-python-4.20.43-1.el7ev.noarch.rpm SHA-256: a40447e85abc3eef877c09fde6922561055a46f739c5e02bb3d1865a4d7e246a
vdsm-python-4.20.43-1.el7ev.noarch.rpm SHA-256: a40447e85abc3eef877c09fde6922561055a46f739c5e02bb3d1865a4d7e246a
vdsm-yajsonrpc-4.20.43-1.el7ev.noarch.rpm SHA-256: a164631ce9099bb002b86a0b48c5ed3540919d68b9d89509f265ffa219f01d16
vdsm-yajsonrpc-4.20.43-1.el7ev.noarch.rpm SHA-256: a164631ce9099bb002b86a0b48c5ed3540919d68b9d89509f265ffa219f01d16

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility