- Issued:
- 2014-09-04
- Updated:
- 2014-09-04
RHBA-2014:1152 - Bug Fix Advisory
Synopsis
vdsm 3.4.2 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now
available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, when attempting to add a Red Hat Enterprise Linux 7 host to the
Manager for the first time following clean RHEL 7 installation, Vdsm failed to
start on the host, and thus the host failed to add. This happened because the
multipathd service behaves differently in RHEL 7 from how it behaves in RHEL
6.5. In RHEL 6.5, the multipathd service disables all devices when starting if
the multipath configuration file does not exist. Creating a new multipath.conf
file and reloading the multipathd service causes multipathd to reload the new
configuration, and installation can continue. In RHEL 7, under the same
circumstances, the multipathd service behaved differently, and would stop
silently, without any error. Reloading the multipathd service failed, because
the service was not running. Now, the behavior in RHEL 7 has been modified to
simulate that of multipathd on RHEL 6.5 hosts; if the multipath configuration
file is missing, the install script creates a new multipath configuration file,
and Vdsm successfully reloads the multipathd service during startup.
(BZ#1125178)
- Previously, duplicate entries were being created in /etc/logroate.d/libvirtd,
because the logs were not being rotated correctly. Now, previous content is
backed up prior to a new entry being added, and libvirt logs are rotated
successfully. (BZ#1115997)
- When a Red Hat Enterprise Virtualization Hypervisor is disconnected from the
network, resources become unavailable, virtual machines lose connectivity, and
in some cases, the host is fenced and data is lost. Previously, there was no way
to track when and why this happened. Now, a new log at
/var/log/vdsm/connectivity.log allows administrators to track network
connectivity. The log tracks the reported speed and duplex of host network
interfaces, and when Vdsm's client (most commonly, Engine) has contacted Vdsm.
(BZ#1122010)
- Previously, if sanlock was present on a system during upgrade from version 3.3
to 3.4, the system attempted to stop and restart sanlock. The update process
would finish, but with vdsm-tool exceptions. Now, sanlock restart is requested
by vdsm-tool only if there is a relevant change. (BZ#1088805)
All users managing Red Hat Enterprise Linux Virtualization hosts using Red Hat
Enterprise Virtualization Manager are advised to install these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Virtualization 3.4 x86_64
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1088805 - Appear vdsm-tool exception in time of vdsm package upgrade from 3.3 to 3.4
- BZ - 1115997 - "/etc/logrotate.d/libvirtd" file is having multiple entries of "/var/log/libvirt/libvirtd.log" after upgrading the host to "rhev-hypervisor6-6.5-20140603.2" version.
- BZ - 1119060 - Pthreading is imported too late
- BZ - 1122010 - [RFE] Host Self-Health Log: network connectivity information
- BZ - 1123842 - Can't login the hypervisor with correct password after upgrading the RHEV-H from "rhevh-6.5-20140603.2.el6ev.iso" to "rhevh-6.5-20140618.0.el6ev.iso"
- BZ - 1125178 - multipathd reload fails when installing running vdsm in the first time on a fresh install where multipath.conf is missing
CVEs
(none)
References
(none)
Red Hat Virtualization 3.4
SRPM | |
---|---|
vdsm-4.14.13-2.el6ev.src.rpm | SHA-256: 7786f8ff85bf319fe35319574fd1baf77cf609c8bed1f5e9a6440af34ce14256 |
x86_64 | |
vdsm-bootstrap-4.14.13-2.el6ev.noarch.rpm | SHA-256: 1e9cc57fa0b25621138cbd8f216b92091cead13dfad4316c60a0214e4bfcccbf |
vdsm-debuginfo-4.14.13-2.el6ev.x86_64.rpm | SHA-256: 112c6f75ccc5c3a134d5e6dfab3274199793c49e9b7f6d0533ebe5f58fc58039 |
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
vdsm-4.14.13-2.el7ev.src.rpm | SHA-256: de18ed6f80b201a84c219d2a9600052df4863f15c3dd8a0a664a5487a5e23d81 |
x86_64 | |
vdsm-4.14.13-2.el7ev.x86_64.rpm | SHA-256: b3761720c02a0c48178f118fda0ceacd5cbfed197fffd94dae2e9b1e27d1cdfc |
vdsm-cli-4.14.13-2.el7ev.noarch.rpm | SHA-256: d3e0fa0e4129c58f77baca39914eded6fd935f5dd38e8c9742be059ccafcd685 |
vdsm-debug-plugin-4.14.13-2.el7ev.noarch.rpm | SHA-256: 86ad2fa5fcdf0a088898fc959643787b927170a617f77c9d871f4d2bc5c4bf27 |
vdsm-debuginfo-4.14.13-2.el7ev.x86_64.rpm | SHA-256: 0517362a249a956f3c0e70e5198f5dbe2b061d46bbb7045747a33c9257879869 |
vdsm-hook-vhostmd-4.14.13-2.el7ev.noarch.rpm | SHA-256: c1461f13cf5c941c40676ab5ce40b293d02f3a229ebf50067268e1fb9bafbfd3 |
vdsm-python-4.14.13-2.el7ev.x86_64.rpm | SHA-256: f35652598c1a4ac19f154c300bfb4a37481af513a7b0202dff10817c1dcda40d |
vdsm-python-zombiereaper-4.14.13-2.el7ev.noarch.rpm | SHA-256: a1ed5b2b17fa7198cd2ab703a92ce02ae63ab231be97c365bce86c8186bbf938 |
vdsm-reg-4.14.13-2.el7ev.noarch.rpm | SHA-256: 4c7a3b4131cfd0965dd195f8b65fcf4519c7b9ea895e8c1fd1a3d20b862d4864 |
vdsm-xmlrpc-4.14.13-2.el7ev.noarch.rpm | SHA-256: 8f6a322573c47b80f0f0d0b7a946b815453746186c15142053565fac9f38dfe6 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.14.13-2.el6ev.src.rpm | SHA-256: 7786f8ff85bf319fe35319574fd1baf77cf609c8bed1f5e9a6440af34ce14256 |
x86_64 | |
vdsm-4.14.13-2.el6ev.x86_64.rpm | SHA-256: b9773989a240c1a7164c49093f7479be0d48efaa8a9a6a7e86d625505e4ef7ae |
vdsm-cli-4.14.13-2.el6ev.noarch.rpm | SHA-256: c7a33be1702890d46c9ad83fb161ab4af6ce6b49a69a6579ba0c996c8a26a5f9 |
vdsm-debuginfo-4.14.13-2.el6ev.x86_64.rpm | SHA-256: 112c6f75ccc5c3a134d5e6dfab3274199793c49e9b7f6d0533ebe5f58fc58039 |
vdsm-hook-vhostmd-4.14.13-2.el6ev.noarch.rpm | SHA-256: d81f84aba9d8b8803591b9d522c6456dca37f2170ffa5e9178f52298d5d6fc92 |
vdsm-python-4.14.13-2.el6ev.x86_64.rpm | SHA-256: 1d04f70e34aff198a7f950172ed827981171eb8e3d1dfefd43d2e3bfbb799f83 |
vdsm-python-zombiereaper-4.14.13-2.el6ev.noarch.rpm | SHA-256: a26078736e33875d7e5e426611273aa5be6be95d30b25f6dc0d614d82fcaad2e |
vdsm-reg-4.14.13-2.el6ev.noarch.rpm | SHA-256: 2faccab5bf7ba26771779bc60ea615344bb68891f73e1fa3fb68416dea2ae8f4 |
vdsm-xmlrpc-4.14.13-2.el6ev.noarch.rpm | SHA-256: 2973982cff19b4db490b4ef3db30f5abe2e5781772c233956d26fe782641d424 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.