- Issued:
- 2018-04-24
- Updated:
- 2018-04-24
RHBA-2018:1218 - Bug Fix Advisory
Synopsis
VDSM bug fix and enhancement update 4.1.11
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1552656 - [4.1.11] Port Mirroring - Cannot shutdown a VM with port mirroring enabled network
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.51-1.el7ev.src.rpm | SHA-256: fa6acb1e41ccb76aa2430704e9f58ab615d7f49d066c4876ac5dbcbf297bac04 |
x86_64 | |
vdsm-4.19.51-1.el7ev.x86_64.rpm | SHA-256: 27dfdec70eb88cc931df2728f10accde062f7bd53835021f003d7e0c3ee3b6fc |
vdsm-api-4.19.51-1.el7ev.noarch.rpm | SHA-256: eaa5f3eeca0e3b3f63093ee46267bd6e8114c9a4b568850c84a35530eabcc1b1 |
vdsm-cli-4.19.51-1.el7ev.noarch.rpm | SHA-256: 891d5cdb66bc130071992d6f93f9b9bd88cfe35e4a26b126ad7abe674d43a6f2 |
vdsm-client-4.19.51-1.el7ev.noarch.rpm | SHA-256: 8cdf76625bda7ffacd9ac310ead8ae22dbe1582793fcf3e5b63db008dc83faa4 |
vdsm-gluster-4.19.51-1.el7ev.noarch.rpm | SHA-256: a2cb7e2992e15c22b115c38fcad007b0e83f534f14d003596d838436d226b944 |
vdsm-hook-checkips-4.19.51-1.el7ev.x86_64.rpm | SHA-256: cae181fc932c9a42a46921e6efab6a5f90cc415f3586e7a7b9cc7d67f99f2981 |
vdsm-hook-ethtool-options-4.19.51-1.el7ev.noarch.rpm | SHA-256: 35b8bbf6f73e44a95d44c222248a319181c8e831e08b66cc4d0ed5f5bf816da5 |
vdsm-hook-extra-ipv4-addrs-4.19.51-1.el7ev.x86_64.rpm | SHA-256: e65dd4a985fa7c2cd1b3c31fa9f22ffd4670228909e76996b2efd3d315c2baef |
vdsm-hook-fcoe-4.19.51-1.el7ev.noarch.rpm | SHA-256: 5ef00f034496d8d47c1d13f26e6f1cfa40b7b1358b1ed9da5ecabad150312157 |
vdsm-hook-localdisk-4.19.51-1.el7ev.noarch.rpm | SHA-256: 19990c48c90077172cf788c6bfb5629a702959f478c6532ef5a07a9838a656d7 |
vdsm-hook-macspoof-4.19.51-1.el7ev.noarch.rpm | SHA-256: 944338b05762c0fd8811f3081ff4adeaf1c97a84eabad3e551c775ded6430255 |
vdsm-hook-nestedvt-4.19.51-1.el7ev.noarch.rpm | SHA-256: f1ddb0fbedc263c3215dde8da07479215b8d85c276e97d84e6d0808c6b779e8e |
vdsm-hook-openstacknet-4.19.51-1.el7ev.noarch.rpm | SHA-256: eb94c89acce8256c146a7d1dc668a77feab87016d369de2ecd7a3b0a8b5ecb75 |
vdsm-hook-vfio-mdev-4.19.51-1.el7ev.noarch.rpm | SHA-256: c345e036071d3ef1b74bfde624e4dc84a48bc6bdf6a810f2dd346bdb3b25fa46 |
vdsm-hook-vhostmd-4.19.51-1.el7ev.noarch.rpm | SHA-256: 5060f5dbf1d61290d1cee8d716a68cf99fd5ae83b79c440311d2e7d1393090f8 |
vdsm-hook-vmfex-dev-4.19.51-1.el7ev.noarch.rpm | SHA-256: 364d15dd11d1c9e3744110d5ba439b79680f88d73dc13e76de6c0e8e233f3c50 |
vdsm-jsonrpc-4.19.51-1.el7ev.noarch.rpm | SHA-256: 01e816375ab8beb08fc9af6a45984ebb4207ff39ace6143cf49eaadcef624abd |
vdsm-python-4.19.51-1.el7ev.noarch.rpm | SHA-256: f2aae9f4ffb301ea794d1bfeb288f579ac5949a640af505ddd8b150e2e9709f5 |
vdsm-xmlrpc-4.19.51-1.el7ev.noarch.rpm | SHA-256: c1c40556c24cb53ec534c7e50aad24cc25ecdeddf26a414161b0afe6c9068e4a |
vdsm-yajsonrpc-4.19.51-1.el7ev.noarch.rpm | SHA-256: d50add0b843a6ea8ccdbc887c82ec409b099b085092c5f30529cb7af5bcf063a |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.51-1.el7ev.src.rpm | SHA-256: fa6acb1e41ccb76aa2430704e9f58ab615d7f49d066c4876ac5dbcbf297bac04 |
ppc64le | |
vdsm-4.19.51-1.el7ev.ppc64le.rpm | SHA-256: e08d8b8c26c7b6faf2915f52b81663eba14a2f1fad9c6b05a5aba8366079412b |
vdsm-api-4.19.51-1.el7ev.noarch.rpm | SHA-256: eaa5f3eeca0e3b3f63093ee46267bd6e8114c9a4b568850c84a35530eabcc1b1 |
vdsm-cli-4.19.51-1.el7ev.noarch.rpm | SHA-256: 891d5cdb66bc130071992d6f93f9b9bd88cfe35e4a26b126ad7abe674d43a6f2 |
vdsm-client-4.19.51-1.el7ev.noarch.rpm | SHA-256: 8cdf76625bda7ffacd9ac310ead8ae22dbe1582793fcf3e5b63db008dc83faa4 |
vdsm-hook-checkips-4.19.51-1.el7ev.ppc64le.rpm | SHA-256: a57aea9288c51fa54c0a3d8cd4fab7c68c9d40cbefe6c000a6fb5ea56d7a6dd6 |
vdsm-hook-ethtool-options-4.19.51-1.el7ev.noarch.rpm | SHA-256: 35b8bbf6f73e44a95d44c222248a319181c8e831e08b66cc4d0ed5f5bf816da5 |
vdsm-hook-extra-ipv4-addrs-4.19.51-1.el7ev.ppc64le.rpm | SHA-256: 0483586c2a4948789930066b488ab88e27915d49fd81580b0da66cb59b154fd4 |
vdsm-hook-fcoe-4.19.51-1.el7ev.noarch.rpm | SHA-256: 5ef00f034496d8d47c1d13f26e6f1cfa40b7b1358b1ed9da5ecabad150312157 |
vdsm-hook-localdisk-4.19.51-1.el7ev.noarch.rpm | SHA-256: 19990c48c90077172cf788c6bfb5629a702959f478c6532ef5a07a9838a656d7 |
vdsm-hook-macspoof-4.19.51-1.el7ev.noarch.rpm | SHA-256: 944338b05762c0fd8811f3081ff4adeaf1c97a84eabad3e551c775ded6430255 |
vdsm-hook-nestedvt-4.19.51-1.el7ev.noarch.rpm | SHA-256: f1ddb0fbedc263c3215dde8da07479215b8d85c276e97d84e6d0808c6b779e8e |
vdsm-hook-openstacknet-4.19.51-1.el7ev.noarch.rpm | SHA-256: eb94c89acce8256c146a7d1dc668a77feab87016d369de2ecd7a3b0a8b5ecb75 |
vdsm-hook-vfio-mdev-4.19.51-1.el7ev.noarch.rpm | SHA-256: c345e036071d3ef1b74bfde624e4dc84a48bc6bdf6a810f2dd346bdb3b25fa46 |
vdsm-hook-vhostmd-4.19.51-1.el7ev.noarch.rpm | SHA-256: 5060f5dbf1d61290d1cee8d716a68cf99fd5ae83b79c440311d2e7d1393090f8 |
vdsm-hook-vmfex-dev-4.19.51-1.el7ev.noarch.rpm | SHA-256: 364d15dd11d1c9e3744110d5ba439b79680f88d73dc13e76de6c0e8e233f3c50 |
vdsm-jsonrpc-4.19.51-1.el7ev.noarch.rpm | SHA-256: 01e816375ab8beb08fc9af6a45984ebb4207ff39ace6143cf49eaadcef624abd |
vdsm-python-4.19.51-1.el7ev.noarch.rpm | SHA-256: f2aae9f4ffb301ea794d1bfeb288f579ac5949a640af505ddd8b150e2e9709f5 |
vdsm-xmlrpc-4.19.51-1.el7ev.noarch.rpm | SHA-256: c1c40556c24cb53ec534c7e50aad24cc25ecdeddf26a414161b0afe6c9068e4a |
vdsm-yajsonrpc-4.19.51-1.el7ev.noarch.rpm | SHA-256: d50add0b843a6ea8ccdbc887c82ec409b099b085092c5f30529cb7af5bcf063a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.