- Issued:
- 2014-07-23
- Updated:
- 2015-02-11
RHBA-2015:0159 - Bug Fix Advisory
Synopsis
vdsm 3.5.0 - bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now
available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
This update fixes several bugs and adds multiple enhancements. Documentation for
these changes is available in the Technical Notes book:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtu alization/3.5/html-single/Technical_Notes/index.html
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 755528 - VDSM: vm with cd as first device when iso domain is blocked from host, will remain in 'wait for launch' with no pid until backend will change domain state to inactive
- BZ - 821493 - [RFE] Multiple queue NICs Feature - RHEV support
- BZ - 1053114 - [vdsm] [Scalability] When host is loaded with networks - addNetwork and getVdsCaps takes a lot of time to return.
- BZ - 1057284 - Error while execution action: Cannot extend Storage Domain. Storage device is unreachable from ${hostname}
- BZ - 1062617 - vdsm does not reflect speed of underlying interface for VLANs
- BZ - 1072030 - High shared memory being reported on hypervisor
- BZ - 1073989 - "data has no embedded checksum" warning when attaching new storage domain
- BZ - 1083100 - vdsm depends on rsyslog
- BZ - 1090109 - The start time for 'migration_max_time_per_gib_mem' appears to be calculated too early.
- BZ - 1092166 - PRD35 - [RFE] Expose prepareImage and teardownImage commands in vdsClient
- BZ - 1097674 - [setupNetworks]IP address for BOND is not updated on the host
- BZ - 1098769 - [vdsm] Reconstruct master fails with ResourceTimeout on an EMC-VNX machine
- BZ - 1100264 - [RHEVM] adding host with VLANed network using dhcp fails
- BZ - 1101021 - VM channels listener crashes - RHEVM 3.4 UI doesn't show VM installed applications
- BZ - 1102549 - ERROR message was shown in vdsm.log on host when VM suspend by RHEVM
- BZ - 1104733 - VDSM failure on migration destination causes stuck migration task
- BZ - 1104774 - RHEV needs to support 4,000 GB of Memory
- BZ - 1111234 - [RFE] Host Self-Health Log: network connectivity information
- BZ - 1111935 - vdsm fails to configure libvirt module when yum updating from 4.10 version to 4.14
- BZ - 1113185 - PRD35 - [RFE] NFS custom mountoptions
- BZ - 1113948 - Vdsm sampling threads unexpectingly stops with IOError ENODEV
- BZ - 1114258 - PRD35 - [RFE] vdsm-tool: replace libvirt-configure.sh with python code
- BZ - 1121295 - Odd vCPU topology dropped by libvirt
- BZ - 1121998 - RHEV-H 20140603.2 - new FC LUNs not visible
- BZ - 1125237 - Use libvirt default logging parameters to reduce cost of starting multiple VMs
- BZ - 1136982 - vdsClient is not showing the correct information of the VM
- BZ - 1139707 - qcow2 images created on rhel7 hosts are unreadable on rhel6 hosts
- BZ - 1144639 - vdsm-reg: interfaces removed only lo remains
- BZ - 1148688 - ssl_accept might block after reboot
- BZ - 1152587 - vdsm-4.14.13-2 sends FC LIP events on storage actions
- BZ - 1159839 - New FC LUNs are not detected on hypervisor without a reboot
- BZ - 1162784 - remove vdsm pki private key leak from rhev log collection
- BZ - 1173257 - RHEV VM with hugepages panics after migration due to memory balloon device
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
x86_64 | |
vdsm-4.16.8.1-5.el7ev.x86_64.rpm | SHA-256: 0b379ca28265f52bd6cfac2c71ac9a14d8d1f3c4f0192ff165eb924f2c7e9259 |
vdsm-bootstrap-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: e7dd206b9af323ea0f3e1046cf47e414ecfe6e24c498860928f86b84844a7756 |
vdsm-cli-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: 6c92c0bc22862111da7165093330cb02d4e47dcc65427a2a2bbaed917bc08a02 |
vdsm-debuginfo-4.16.8.1-5.el7ev.x86_64.rpm | SHA-256: 305bf32385f5f6be347f794a3d18ac6ddc973a7786a21509421f67c622390661 |
vdsm-hook-ethtool-options-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: f1d4b9d496c00872308349b4c34d748c6f45ffeaa187ad3f8d5f8b99846903c0 |
vdsm-hook-macspoof-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: 3a15e548f4c786e2461a4a84ff43c3bbfaeb2ec620b57be440a1755f9accf283 |
vdsm-hook-openstacknet-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: 5bee094aa706cdca4166054b61aac8bc2414e8063989cef7bc4dfbce3f5ba111 |
vdsm-hook-vhostmd-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: c11138901b9050cb9a8c89298ab14aaf5d5e43e95a7fbd6215d465fae814f58b |
vdsm-jsonrpc-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: c1e678ce38e771f8462f2caebe5e0f74b5dfeca38ff40443a4896a8e0bf23f11 |
vdsm-python-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: 19349425054835c851297ab8eefe731de44d284151cc87c9124a641c238a1c36 |
vdsm-python-zombiereaper-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: c0f440b56911c2ffdfe2331261e97ad3173840147ffca262caad51d2a787382f |
vdsm-reg-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: db1ef8636e9a6fd4153a5562462c2e4ba0ecefff65f71389c21545c0aa821ee9 |
vdsm-xmlrpc-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: 0832aaa36e8e6f337bbe685f681a6dec146ae67303e9d3b026d6ff60389e260f |
vdsm-yajsonrpc-4.16.8.1-5.el7ev.noarch.rpm | SHA-256: 1993c97daca6721810359deb779f8793d10774f61fdac0ab568ad6b3003efcd6 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.16.8.1-5.el6ev.src.rpm | SHA-256: 524a4bc4c7a4047b2ff84f38fe4056b4e5e7f57a17708526e6e105aedc3a8590 |
x86_64 | |
vdsm-4.16.8.1-5.el6ev.x86_64.rpm | SHA-256: 1868b5119a494d9cde1e6321d3a6e4174229577dd90b7f9bc73a60e8047d43ef |
vdsm-bootstrap-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: dd956880aca8e8a455acf01c0a4899558c86eec45f55d7ac8ca2d9d649e1a795 |
vdsm-cli-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 80ca0dbb73cc9bb59dceb6670d2cae5e795cbf5c11e5f62abf38fea7cc211c38 |
vdsm-debuginfo-4.16.8.1-5.el6ev.x86_64.rpm | SHA-256: ec6b96ca01c902add9f935bacf65921c5a70621e13f95d15bbc61e0b710d3c23 |
vdsm-hook-ethtool-options-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 9078acc596266453891ea5f5fcced9e9cb7809f10eb2b60955b04860c031c2be |
vdsm-hook-macspoof-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 7f79ba1ad009c914a89e8992bb8e6e64de22a3c603776e649a141dd424f30643 |
vdsm-hook-openstacknet-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 17c9a6e01324c4c4c97ae143ca19502cd1067c362765844744f4fff0d986ce45 |
vdsm-hook-vhostmd-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 8f3a9841da5b1a14a84f837c01b549fc4c9f8fd8576704035081153d200e73cc |
vdsm-jsonrpc-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: f95068260f657e18e86c436e6d1c59c52f2b1747acc0d0887abd3bf32190ab02 |
vdsm-python-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 455b8e3c01391105ace4feb6bb178385fc5453db2e007ed24acc4c3f73d6258c |
vdsm-python-zombiereaper-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 0e3ad3417820f918e6d3a0bb24791bfad67898e00585872962898b79cc230065 |
vdsm-reg-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: b0c81ce99bc4c18f87f62b99f17ae7df02d40dce7228c95d12768ff0f1c6c449 |
vdsm-xmlrpc-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: 97e82c86e057fb5c0cadffdfbb4f40865d53ee34a8356b6471466abeb4ca6749 |
vdsm-yajsonrpc-4.16.8.1-5.el6ev.noarch.rpm | SHA-256: a55c625f221df75caf234a36b880cbaaea34ccf332426989c8c390a4ab77f474 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.