- Issued:
- 2013-05-29
- Updated:
- 2013-05-29
RHBA-2013:0877 - Bug Fix Advisory
Synopsis
rhev 3.1.4.1 - vdsm bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fixes a bug are now available.
Description
The Virtual Desktop Server Manager (VDSM) is a management module that serves as
the Red Hat Enterprise Virtualization Manager's agent on Red Hat Enterprise
Virtualization Hypervisor or Red Hat Enterprise Linux
virtualization hosts.
This update fixes the following bug:
- After upgrading to 3.1, a snapshot of a virtual machine from the older
environment can be successfully removed, but the virtual machine would fail to
start. This was due to a failure to tear down the snapshot's volume path on the
host storage manager prior to merging the snapshot, which left the volume
activated on both the storage pool manager and the host storage manager. This
update removes unnecessary volume paths and deactivates the snapshot volumes
after they are deleted, so virtual machines can run successfully under these
conditions. (BZ#966085)
All users managing Red Hat Enterprise Linux Virtualization hosts using Red Hat
Enterprise Virtualization Manager are advised to install these updated packages
which fix this bug.
These updated packages will be provided to users of Red Hat Enterprise
Virtualization Hypervisor in the next rhev-hypervisor6 errata package.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Virtualization 3.1 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 966085 - VM no longer bootable after snapshot removal
CVEs
(none)
References
(none)
Red Hat Virtualization 3.1
SRPM | |
---|---|
vdsm-4.10.2-1.14.el6ev.src.rpm | SHA-256: ab29c93434143e239d1d8f1e9c89d5b8cffd6768e3a52b9181f6bf9725036286 |
x86_64 | |
vdsm-bootstrap-4.10.2-1.14.el6ev.noarch.rpm | SHA-256: 779f048507e44131c946112506a584451a31f35d0a411cf1a5c4deae445163ce |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.10.2-1.14.el6ev.src.rpm | SHA-256: ab29c93434143e239d1d8f1e9c89d5b8cffd6768e3a52b9181f6bf9725036286 |
x86_64 | |
vdsm-4.10.2-1.14.el6ev.x86_64.rpm | SHA-256: 88bf8b005fc753ed7fe0bda84cbcac7bb37c2ec18c352e7b329adf47cb60ac33 |
vdsm-cli-4.10.2-1.14.el6ev.noarch.rpm | SHA-256: 6e71f168f672da06d9ded73a64a033dd117f24ee85533fdf36432bfcd7abc978 |
vdsm-debuginfo-4.10.2-1.14.el6ev.x86_64.rpm | SHA-256: e13eafc157c724ecc3c381793f3e3760306cbe416939b84b0b7861ef73e6fb12 |
vdsm-hook-vhostmd-4.10.2-1.14.el6ev.noarch.rpm | SHA-256: cb734aa35da3130668998ef092569ae7ef0569e4d104ed81d7bd186680b1c400 |
vdsm-python-4.10.2-1.14.el6ev.x86_64.rpm | SHA-256: d2dac03e76c035f8e2abd956ef70d78ec6cf37a2bac2ca5bb1d958f31e9cb160 |
vdsm-reg-4.10.2-1.14.el6ev.noarch.rpm | SHA-256: 23cf85cbf52bd91a8749adc2faf3bc26ff04be4ab0ae429237e89ae95581e3fc |
vdsm-xmlrpc-4.10.2-1.14.el6ev.noarch.rpm | SHA-256: 45d94aed924b56a3d12e399c0af278dd5af5473e6c198a3fb9190e2cf05c16e7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.