- Issued:
- 2014-10-27
- Updated:
- 2014-10-27
RHBA-2014:1721 - Bug Fix Advisory
Synopsis
vdsm 3.4.3 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now
available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, the VDSM statistics gathering thread did not account for network
devices being removed while an instance of statistics gathering was in progress.
This would result in attempting to retrieve data from a non-existing device,
causing an exception. Now, devices that are removed are also removed from the
statistics report, allowing statistics gathering to return successfully even
when network devices are removed while statistics gathering is in progress.
(BZ#1129377)
All users managing Red Hat Enterprise Linux Virtualization hosts using Red Hat
Enterprise Virtualization Manager are advised to install these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3.4 x86_64
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1126482 - Incorrect usage of logrotate leads to using two different settings
- BZ - 1129377 - Vdsm sampling threads unexpectingly stops with IOError ENODEV
- BZ - 1147502 - Vdsm should recognize OSName.POWERKVM
CVEs
(none)
References
(none)
Red Hat Virtualization 3.4
SRPM | |
---|---|
vdsm-4.14.17-1.el6ev.src.rpm | SHA-256: cc860cb6763b7b38d86414874934b0ed6e482e34edbed26b8df9f65bede16dbb |
x86_64 | |
vdsm-bootstrap-4.14.17-1.el6ev.noarch.rpm | SHA-256: 56ef5d359127a8e0ba9ac0d925703a705d4d8e5270ad5197abcb67294b338315 |
vdsm-debuginfo-4.14.17-1.el6ev.x86_64.rpm | SHA-256: 4a458338fa04976b09d52bbd27a86067a17afc781ab9cf9a926c09a7326ba062 |
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
vdsm-4.14.17-1.el7.src.rpm | SHA-256: 9cb4f6ef54547aef019adc4671172ea3656fbf7af5b7c9717a6c69bd58778226 |
x86_64 | |
vdsm-4.14.17-1.el7.x86_64.rpm | SHA-256: 9fc1157c27ecb07296e04205cae8e79539c6a895913155452d1b6cd0b1bdd1ee |
vdsm-cli-4.14.17-1.el7.noarch.rpm | SHA-256: 709f1d03f4dc9225caedcdd27bcfc3969ce4302718aa95a4768347304ca33c01 |
vdsm-debug-plugin-4.14.17-1.el7.noarch.rpm | SHA-256: e1e0c9f9564417ccbd76026b8f1816e4801ba70ba70442b7d7e4b02c75eeba58 |
vdsm-debuginfo-4.14.17-1.el7.x86_64.rpm | SHA-256: c079b51f0a95ead65fa9fad492fe0f94dd0092f07d98bbd8f3583adc594821a5 |
vdsm-hook-vhostmd-4.14.17-1.el7.noarch.rpm | SHA-256: 2d1cbd630ddfc1a37e8e688595191039d6c7afdffe90ef9fdcfbb2a5cd67cc73 |
vdsm-python-4.14.17-1.el7.x86_64.rpm | SHA-256: 1a2d7ca303cf1651e2ff421f6cae61ac43406ec343b0aaea53e4a2ffdafb02b8 |
vdsm-python-zombiereaper-4.14.17-1.el7.noarch.rpm | SHA-256: 005c7b05977dbc4e77cc36fe195bd7308220508d4c80d25c9a08dc0863726d64 |
vdsm-reg-4.14.17-1.el7.noarch.rpm | SHA-256: 7ec727f1ded4d213c7b5ba225977a3a4ac669b16610759961d689abf17f48871 |
vdsm-xmlrpc-4.14.17-1.el7.noarch.rpm | SHA-256: 397ff4dee124acdba5d3cb799f2b03d0c883c0703d293d6ffaf42b5136e98e75 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.14.17-1.el6ev.src.rpm | SHA-256: cc860cb6763b7b38d86414874934b0ed6e482e34edbed26b8df9f65bede16dbb |
x86_64 | |
vdsm-4.14.17-1.el6ev.x86_64.rpm | SHA-256: 352e28ad1c2ae10e88c7e5542badb93cf2797e5ea296b91c9eaf9b71c64cb83c |
vdsm-cli-4.14.17-1.el6ev.noarch.rpm | SHA-256: 9194067f5df933beab10ddea0d2438f579116cdda3e2bfa86cf34a122e625985 |
vdsm-debuginfo-4.14.17-1.el6ev.x86_64.rpm | SHA-256: 4a458338fa04976b09d52bbd27a86067a17afc781ab9cf9a926c09a7326ba062 |
vdsm-hook-vhostmd-4.14.17-1.el6ev.noarch.rpm | SHA-256: d4087c9a3d05e61a22aaadb91c8740a78b6628cb24af3d1e6f87e4b7b3ae3ef3 |
vdsm-python-4.14.17-1.el6ev.x86_64.rpm | SHA-256: 8db36aed1dafa8699f52e638f921ff609f15d53e8bbd147adb8c08cb2b5974fb |
vdsm-python-zombiereaper-4.14.17-1.el6ev.noarch.rpm | SHA-256: e91aa7a9996f097c9c44b90405d977486aec11a0fb445d70ae3c069ce7878a70 |
vdsm-reg-4.14.17-1.el6ev.noarch.rpm | SHA-256: 5ea30cc1a088006d9c340b0c3708c549732c2439dc6285598312e459e4669519 |
vdsm-xmlrpc-4.14.17-1.el6ev.noarch.rpm | SHA-256: f9dd142869134dbfaff2dde74ecce05af9b38e3f756718dd7e908c553cfd8452 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.