- Issued:
- 2013-07-16
- Updated:
- 2013-07-16
RHBA-2013:1073 - Bug Fix Advisory
Synopsis
rhev 3.2.1 - vdsm bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix various bugs are now available.
Description
VDSM is a management module that serves as a Red Hat Enterprise
Virtualization Manager agent on Red Hat Enterprise Virtualization
Hypervisor or Red Hat Enterprise Linux hosts.
This update fixes various bugs.
Changes to the vdsm component:
- SSL handshakes are now cached with the hosts in order to reduce CPU load on
the hosts. (BZ#857035)
- Previously, it was not possible to attach a fibre channel storage domain to
Red Hat Enterprise Virtualization when using a QLogic iSCSI HBA offload card.
Now, it is possible to attach a fibre channel storage domain to Red Hat
Enterprise Virtualization when using a QLogic iSCSI HBA offload card.
(BZ#972863)
- Previously, an unhandled EPERM exception while attempting to unregister a FD
lead to the virtual machine Channel Listener thread dying.
Now, an unhandled EPERM exception while attempting to unregister a FD no longer
leads to the virtual machine Channel Listener thread dying. (BZ#972749)
- Previously VDSM provided unnecessary warning messages regarding storage
latency. This led users to believe that the storage domains were operating too
slowly, even when they were fine.
Now, VDSM accurately provides warning messages so that only actual cases of
problematic latency are reported. (BZ#972700)
- Previously accessing the TUI via SSH would sometimes produce out of place
debug messages in the background of the TUI screen. This has been corrected so
that the TUI appearance is as expected. (BZ#965762)
All users managing Red Hat Enterprise Linux Virtualization hosts using Red
Hat Enterprise Virtualization Manager are advised to install these updated
packages, which fix these issues.
These updated packages will be provided to users of Red Hat Enterprise
Virtualization Hypervisor in the next rhev-hypervisor6 errata package.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Virtualization 3.2 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 857035 - PRD32 - cache ssl handshakes with the hosts to reduce cpu load
- BZ - 965762 - [rhevh] TUI over ssh - debug messages on background
- BZ - 972700 - vdsm storage latency timings are inaccurate
- BZ - 972863 - Cannot attach FC storage domain to RHEV when using QLogic iSCSI HBA offload card
CVEs
(none)
References
(none)
Red Hat Virtualization 3.2
SRPM | |
---|---|
vdsm-4.10.2-23.0.el6ev.src.rpm | SHA-256: e67884a16a915d152ca3da46bb681322a1e17c080cbee1ebcdbe46175d893321 |
x86_64 | |
vdsm-debuginfo-4.10.2-23.0.el6ev.x86_64.rpm | SHA-256: ec71ffa37b11c9fb8f56f31bfe9570b93dcfe1c3f79dff69ef8e7d8ed1e2e4b1 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.10.2-23.0.el6ev.src.rpm | SHA-256: e67884a16a915d152ca3da46bb681322a1e17c080cbee1ebcdbe46175d893321 |
x86_64 | |
vdsm-4.10.2-23.0.el6ev.x86_64.rpm | SHA-256: f7c988b3bfde4b9e4c458e7ddf582f45d6aafdde13dcb3f48a1bde09276f497d |
vdsm-cli-4.10.2-23.0.el6ev.noarch.rpm | SHA-256: fa50e068f3988cde7b2f6a4aab1c5ca4fc6b51888a86425a9a74c0abf50ce22c |
vdsm-debuginfo-4.10.2-23.0.el6ev.x86_64.rpm | SHA-256: ec71ffa37b11c9fb8f56f31bfe9570b93dcfe1c3f79dff69ef8e7d8ed1e2e4b1 |
vdsm-hook-vhostmd-4.10.2-23.0.el6ev.noarch.rpm | SHA-256: 7143e21f2df5d96a140620f0f60df53a20d948effd43d2acf87e9a6140445635 |
vdsm-python-4.10.2-23.0.el6ev.x86_64.rpm | SHA-256: 9dc109d3b03f66032e0153386930b1f1e9bc243ac91e2517ba3dce0d4ff01ae7 |
vdsm-reg-4.10.2-23.0.el6ev.noarch.rpm | SHA-256: 0c0b87dc008c28864f0560d092ec484ee034dfeaacdc9cdba71f5ce0a63f8cf3 |
vdsm-xmlrpc-4.10.2-23.0.el6ev.noarch.rpm | SHA-256: 09a03f950c02e090a2ec6e5e29f5819c93eb800d1d095f1fe3e725def8409e0f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.