- Issued:
- 2019-10-10
- Updated:
- 2019-10-10
RHEA-2019:3010 - Product Enhancement Advisory
Synopsis
ovirt-engine bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-engine packages that fix several bugs and add various enhancements are now available.
Description
The ovirt-engine package provides the manager for virtualization environments. This manager enables admins to define hosts and networks, as well as to add storage, create VMs and manage user permissions.
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.3/html-single/technical_notes
Changes to the ovirt-engine component:
- During host activation, the engine did not check the glusterd status. The gluster service was restarted even though the glusterd was not stopped during maintenance.
In this release, the quorum is not lost upon host activation. (BZ#1751142)
- Previously, a snapshot disk that downloaded when it was attached to a backup Virtual Machine got locked due to a failure to teardown the disk.
The current release fixes this error by skipping the disk teardown in case of a snapshot disk. (BZ#1753168)
- A new text field has been added to the affinity group dialog to set priority. It can contain any real number, not just integers. Priority can also be set using a new parameter in the REST API.
When a Virtual Machine is started or migrated, a host is selected, with the broken affinity groups having the lowest priority.
If not all affinity groups can be satisfied, the groups with lower priority are broken first. (BZ#1680498)
- During installation or upgrade to Red Had Virtualization 4.3, engine-setup failed if the PKI Organization Name in the CA certificate included non-ASCII characters.
In this release, the upgrade engine-setup process completes successfully. (BZ#1733438)
- The Database field guest_cur_user_name in the vm_dynamic Database Table was limited to a size of 255 characters, which was not enough to accept a large number of users (for example, more than 100) to log in.
In this release, there is no character limit for the guest_cur_user_name field. (BZ#1734671)
- Red Had Virtualization virtual machines now support passing ignition configuration for any guest that supports it, such as RHCOS or FCOS.
A guest RHCOS/FCOS guest OS can now be configured by passing ignition configuration using the UI or the API. (BZ#1712747)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization Manager 4.3 x86_64
Fixes
- BZ - 1631150 - [Security] New user can steal already opened spice session from previous user
- BZ - 1680498 - [RFE] Implement priorities for soft affinity groups
- BZ - 1680499 - [RFE] Allowing use of labels in affinity groups
- BZ - 1712437 - [downstream clone - 4.3.7] [scale] RHV-M runs out of memory due to to much data reported by the guest agent
- BZ - 1712747 - [downstream clone - 4.3.6] [RFE] Ignition support for ovirt vms with a custom payload
- BZ - 1718694 - Fix message about removing iptables support in 4.3
- BZ - 1733438 - [downstream clone - 4.3.6] engine-setup fails to upgrade to 4.3 with Unicode characters in CA subject
- BZ - 1734616 - Build RHV-M 4.3.6 - RHEL 7
- BZ - 1734671 - [scale] updatevmdynamic broken if too many users logged in - psql ERROR: value too long for type character varying(255)
- BZ - 1741152 - [downstream clone - 4.3.6] [RFE] - Creating an NFS storage domain the engine should let the user specify exact NFS version v4.0 and not just v4
- BZ - 1741155 - [downstream clone - 4.3.6] a new size of the direct LUN not updated in Admin Portal
- BZ - 1743246 - [downstream clone - 4.3.6] Move/Copy disk are blocked if there is less space in source SD than the size of the disk
- BZ - 1744507 - [downstream clone - 4.3.6] Snapshot creation was successful, but snapshot remains locked
- BZ - 1744510 - [downstream clone - 4.3.6] Disk migration progress bar not clearly visible and unusable.
- BZ - 1744571 - [downstream clone - 4.3.6] VMs will fail to start if the vnic profile attached is having port mirroring enabled and have name greater than 15 characters
- BZ - 1745491 - [downstream clone - 4.3.6] Unable to start guests in our Power9 cluster without running in headless mode.
- BZ - 1746730 - [downstream clone - 4.3.6] Engine deletes the leaf volume when SnapshotVDSCommand timed out without checking if the volume is still used by the VM
- BZ - 1748387 - [downstream clone - 4.3.7] NPE in DestroyImage endAction during live merge leaving a task in DB for hours causing operations depending on host clean tasks to fail as Deactivate host/StopSPM/deactivate SD
- BZ - 1751142 - [downstream clone - 4.3.6] host activation causes RHHI nodes to lose the quorum
- BZ - 1753168 - [downstream clone - 4.3.6] teardownImage attempts to deactivate in-use LV's rendering the VM disk image/volumes in locked state.
CVEs
(none)
References
(none)
Red Hat Virtualization Manager 4.3
SRPM | |
---|---|
ovirt-engine-4.3.6.7-0.1.el7.src.rpm | SHA-256: 8bc5055814c46c3ef00fe35daceecb8440a71df06d87273a8cfb641a93440f37 |
x86_64 | |
ovirt-engine-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: cfd1c5a1f4f81bd859818e6ccf2e27cc1c5c642bdd17f70f8c46ac1e3b44247b |
ovirt-engine-backend-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 7f13e013e70b1de83ceb5f7db9f40fa737ea02973bff5538f34235993e31d6f5 |
ovirt-engine-dbscripts-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 29ad41fee87f0788373dd6585abc7e2ba285f885595895eeda0ae498d70a1719 |
ovirt-engine-extensions-api-impl-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: c41678af21036a2af462b054ba6d7d3b4e765d6d5339783b578e4f85c63dc0b7 |
ovirt-engine-extensions-api-impl-javadoc-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 3ef16d903502a890dd70a038e882fb221cffe1ca6ee9e9af4f18af60fd5763d1 |
ovirt-engine-health-check-bundler-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 59305b84bad8d2652a2bed7440122d7d1ba0269d0a7ceb12c0eeebf7b543a52b |
ovirt-engine-restapi-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: a0e8991ae64c6771427c352c6201b2c102307d116cfc9fbe180b85699a02dcc0 |
ovirt-engine-setup-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 583416ec0464975ec65f98b03a71de093be38b77ae101a6d8d95828fb8c58465 |
ovirt-engine-setup-base-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 69bf41b0a3bf280115e0bce16a32fc52810941492dc308d422b1df6e2743feff |
ovirt-engine-setup-plugin-cinderlib-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: b4ad721674dd732d92f9c5fb7c2914096605c773b9ff71a4a6dfef0701b4f829 |
ovirt-engine-setup-plugin-ovirt-engine-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 5a9991fd5b1b5b325a11d7cd0390ad7028325d512c4faa86df8ab4c92cfa0f26 |
ovirt-engine-setup-plugin-ovirt-engine-common-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: f03503bff79d04bd32236baa7eca754843d0d91e7f12d8f553c7a7644729a24f |
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: a13eee318b9744261532f913b624187d3fd50f836138fac38693767c6c0d421c |
ovirt-engine-setup-plugin-websocket-proxy-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 8fa75e25b51002a60594e5493f7be4d3f4de4e1306051f1860cf0c67a3bf30c2 |
ovirt-engine-tools-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 956a30f210e64eab522669e46fe29eed1fd5e7073cc46c992784485b720c6211 |
ovirt-engine-tools-backup-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 4324653066f478eeaf13db385fc8c3bc55095ffc6ca670a41a30b119bdcee952 |
ovirt-engine-vmconsole-proxy-helper-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 3f2c80990e003d62ebd9f0b6ffdb9b7e58d9d45017c1eea4376534ff241f5fc5 |
ovirt-engine-webadmin-portal-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: d29efd100a754d23c68e4b18d67944d344fe8e62895ad99f3c03669433f9c40b |
ovirt-engine-websocket-proxy-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: effd2d3a484cb58b1e53f02fb5f76e1d8966fd56424bbdfcdaa0249a8a30eb14 |
python2-ovirt-engine-lib-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 4a9fa8b2a0a9a3d1fb983e69eb296c704e9df6ed6d736f8f9cb01e8ca3057086 |
rhvm-4.3.6.7-0.1.el7.noarch.rpm | SHA-256: 46fdc3e28ac396044726c27f1e21cd3b980aaf8d28710d58ac22622b38df11bc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.