Bug Fix Advisory open-vm-tools bug fix update

Advisory: RHBA-2017:0506-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2017-03-14
Last updated on: 2017-03-14
Affected Products: Red Hat Enterprise Linux HPC Node EUS (v. 7.2)
Red Hat Enterprise Linux Server AUS (v. 7.2)
Red Hat Enterprise Linux Server EUS (v. 7.2)
Red Hat Enterprise Linux Server TUS (v. 7.2)

Details

Updated open-vm-tools packages that fix several bugs are now available for Red
Hat Enterprise Linux 7 Extended Update Support.

The open-vm-tools project is an open source implementation of VMware Tools. It
is a suite of open source virtualization utilities and drivers to improve the
functionality, user experience and administration of VMware virtual machines.
This package contains only the core user-space programs and libraries of
open-vm-tools.

This update fixes the following bugs:

* Previously, the vmtoolsd service in some cases entered a deadlock state when
taking a snapshot of a Red Hat Enterprise Linux 7 system on the VMWare ESXi
hypervisor. Now, vmtoolsd takes into account the dependencies between mount
points when taking a snapshot, and the described problem no longer occurs.
(BZ#1423435)

* Previously, virtualized SCSI devices in some cases went offline due to
temporary transport problems. With this update, a new udev rule for the SCSI
timeout increases this timeout from 30 seconds to 180 seconds, which prevents
the described problem from occurring. (BZ#1423435)

* Prior to this update, taking a snapshot of a Red Hat Enterprise Linux 7 guest
on the VMWare ESXi hypervisor failed if docker images were running on the guest.
With this update, the vmtoolsd service properly quiesces the guest file system
in the described scenario, which makes it possible for the snapshots to be
taken. (BZ#1421792)

Users of open-vm-tools are advised to upgrade to these updated packages, which
fix these bugs.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux HPC Node EUS (v. 7.2)

SRPMS:
open-vm-tools-9.10.2-8.el7_2.src.rpm     MD5: d033361e1e919fe7fd31ecc19a5e5ff4
SHA-256: 030b45afe0d04792c514c405e8ef2be23f7bddb7895687384d6dd5e11d64739b
 
x86_64:
open-vm-tools-9.10.2-8.el7_2.x86_64.rpm     MD5: 0794cd2f6c77870ff3564ff7ceadd6d1
SHA-256: b73e934a56c02aecdc9d4129ab74dbd109c23bda13d5d6a504112d275529f342
open-vm-tools-debuginfo-9.10.2-8.el7_2.x86_64.rpm     MD5: 00a578c095bb81fdd7a96f29d0b03df9
SHA-256: 925e7699e4519699e2d166dd44ac9d37da12b6e8e58b6d49a02aea1ddad8f105
open-vm-tools-desktop-9.10.2-8.el7_2.x86_64.rpm     MD5: cad877d7aaf6fd6a54922bb58ba19af5
SHA-256: 6e0a53ad9d7b7855db974438f3558e4cb6be67fff67c1b8fdfbbdcd2320d33ca
open-vm-tools-devel-9.10.2-8.el7_2.x86_64.rpm     MD5: 1b62987f854d3e4658850c4ae1737966
SHA-256: 1a64905c185c3151dfa85d749e0724b9aedb732d7c52a597c425a39fcce7cff6
 
Red Hat Enterprise Linux Server AUS (v. 7.2)

SRPMS:
open-vm-tools-9.10.2-8.el7_2.src.rpm     MD5: d033361e1e919fe7fd31ecc19a5e5ff4
SHA-256: 030b45afe0d04792c514c405e8ef2be23f7bddb7895687384d6dd5e11d64739b
 
x86_64:
open-vm-tools-9.10.2-8.el7_2.x86_64.rpm     MD5: 0794cd2f6c77870ff3564ff7ceadd6d1
SHA-256: b73e934a56c02aecdc9d4129ab74dbd109c23bda13d5d6a504112d275529f342
open-vm-tools-debuginfo-9.10.2-8.el7_2.x86_64.rpm     MD5: 00a578c095bb81fdd7a96f29d0b03df9
SHA-256: 925e7699e4519699e2d166dd44ac9d37da12b6e8e58b6d49a02aea1ddad8f105
open-vm-tools-desktop-9.10.2-8.el7_2.x86_64.rpm     MD5: cad877d7aaf6fd6a54922bb58ba19af5
SHA-256: 6e0a53ad9d7b7855db974438f3558e4cb6be67fff67c1b8fdfbbdcd2320d33ca
open-vm-tools-devel-9.10.2-8.el7_2.x86_64.rpm     MD5: 1b62987f854d3e4658850c4ae1737966
SHA-256: 1a64905c185c3151dfa85d749e0724b9aedb732d7c52a597c425a39fcce7cff6
 
Red Hat Enterprise Linux Server EUS (v. 7.2)

SRPMS:
open-vm-tools-9.10.2-8.el7_2.src.rpm     MD5: d033361e1e919fe7fd31ecc19a5e5ff4
SHA-256: 030b45afe0d04792c514c405e8ef2be23f7bddb7895687384d6dd5e11d64739b
 
x86_64:
open-vm-tools-9.10.2-8.el7_2.x86_64.rpm     MD5: 0794cd2f6c77870ff3564ff7ceadd6d1
SHA-256: b73e934a56c02aecdc9d4129ab74dbd109c23bda13d5d6a504112d275529f342
open-vm-tools-debuginfo-9.10.2-8.el7_2.x86_64.rpm     MD5: 00a578c095bb81fdd7a96f29d0b03df9
SHA-256: 925e7699e4519699e2d166dd44ac9d37da12b6e8e58b6d49a02aea1ddad8f105
open-vm-tools-desktop-9.10.2-8.el7_2.x86_64.rpm     MD5: cad877d7aaf6fd6a54922bb58ba19af5
SHA-256: 6e0a53ad9d7b7855db974438f3558e4cb6be67fff67c1b8fdfbbdcd2320d33ca
open-vm-tools-devel-9.10.2-8.el7_2.x86_64.rpm     MD5: 1b62987f854d3e4658850c4ae1737966
SHA-256: 1a64905c185c3151dfa85d749e0724b9aedb732d7c52a597c425a39fcce7cff6
 
Red Hat Enterprise Linux Server TUS (v. 7.2)

SRPMS:
open-vm-tools-9.10.2-8.el7_2.src.rpm     MD5: d033361e1e919fe7fd31ecc19a5e5ff4
SHA-256: 030b45afe0d04792c514c405e8ef2be23f7bddb7895687384d6dd5e11d64739b
 
x86_64:
open-vm-tools-9.10.2-8.el7_2.x86_64.rpm     MD5: 0794cd2f6c77870ff3564ff7ceadd6d1
SHA-256: b73e934a56c02aecdc9d4129ab74dbd109c23bda13d5d6a504112d275529f342
open-vm-tools-debuginfo-9.10.2-8.el7_2.x86_64.rpm     MD5: 00a578c095bb81fdd7a96f29d0b03df9
SHA-256: 925e7699e4519699e2d166dd44ac9d37da12b6e8e58b6d49a02aea1ddad8f105
open-vm-tools-desktop-9.10.2-8.el7_2.x86_64.rpm     MD5: cad877d7aaf6fd6a54922bb58ba19af5
SHA-256: 6e0a53ad9d7b7855db974438f3558e4cb6be67fff67c1b8fdfbbdcd2320d33ca
open-vm-tools-devel-9.10.2-8.el7_2.x86_64.rpm     MD5: 1b62987f854d3e4658850c4ae1737966
SHA-256: 1a64905c185c3151dfa85d749e0724b9aedb732d7c52a597c425a39fcce7cff6
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1421792 - [ESX][open-vm-tools][RHEL7.2]When running docker containers, the open-vm-tools SyncDriver fails to quiesce filesystems and returns an error



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/