- Issued:
- 2017-05-24
- Updated:
- 2017-07-17
RHEA-2017:1281 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.1.2
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- An incorrect storage domain procedure can create invalid storage domain lvm metadata. If the invalid storage domain lvm metadata is detected the system would fail to activate the storage domain.
A warning is now logged when an invalid storage domain is detected, without failing the activation. (BZ#1450634)
- Previously, CD ejection was performed in a forceful way, similar to using a paperclip on a physical CD-ROM drive. That could cause various issues like displaying the contents of the last inserted CD after it has been ejected, and reporting IO errors when trying to access the files.
This has now been fixed and CDs are ejected correctly, similar to pressing the button on a physical CD-ROM drive.
Please note that various errors can still occur when changing a CD while accessing it. We do not recommend changing CDs when they are being accessed. If you experience any difficulties with changing CDs, please eject the CD first and only then insert another one. (BZ#1428514)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1421556 - Setting log level as shown in README.logging fails.
- BZ - 1428514 - RHEL guests cannot recognize attached CD after CD change
- BZ - 1445920 - [downstream clone - 4.1.2] Host unavailable after upgrade from RHEL-H 7.3 (RHEV 3.6) upgrade to RHEL-H 7.3 (RHV 4.0)
- BZ - 1448473 - [downstream clone - 4.1.2] getAllVmIoTunePolicies exceptions in VDSM
- BZ - 1450634 - [downstream clone - 4.1.2] Storage domain in 4.1 RHV will go offline if LVM metadata was restored manually
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.15-1.el7ev.src.rpm | SHA-256: f51625db731e9d68e9806bbbf7b0a9e9555a6ceef6f82ead6a64ff8071e7dce1 |
x86_64 | |
vdsm-4.19.15-1.el7ev.x86_64.rpm | SHA-256: 101aff32f6ee4b976e308ee6f0ffed1efb2bb97966543e277609e09400f75448 |
vdsm-api-4.19.15-1.el7ev.noarch.rpm | SHA-256: 48ccd92a9a62c9862a6d12cc239527f998cfe4987faa4e54f8a7d2e5f7fc657b |
vdsm-cli-4.19.15-1.el7ev.noarch.rpm | SHA-256: bb429e21af32b02a723a9cab5ce6c9600b0dc9267f3a4963fee7629ae1da525b |
vdsm-client-4.19.15-1.el7ev.noarch.rpm | SHA-256: 75b9b08c3f697fcd62b5bc921b1ab88e51288e38d68dd17f4aad0f618eb315ab |
vdsm-gluster-4.19.15-1.el7ev.noarch.rpm | SHA-256: 32d8de6dd3a489bc9eb311f26978185d2c50d4f0fdd26a029214239b995fb576 |
vdsm-hook-ethtool-options-4.19.15-1.el7ev.noarch.rpm | SHA-256: a339b50a15aba960d71f9cff47ac8aae32b31fba0799c041bd06644517b1a576 |
vdsm-hook-fcoe-4.19.15-1.el7ev.noarch.rpm | SHA-256: af91e0308eb60e650d226cb52b2303fec9a09cbbd1040589cbbfb0bae9b27c71 |
vdsm-hook-macspoof-4.19.15-1.el7ev.noarch.rpm | SHA-256: e1e90ebf4c2f60e8b0ba386da113702e02391c410fa00dc694a88f762561f71c |
vdsm-hook-openstacknet-4.19.15-1.el7ev.noarch.rpm | SHA-256: 7da1e83b4f5ae51343ca743f7fe6de693367d8c72ec1a46f9abe4236f4577b87 |
vdsm-hook-vhostmd-4.19.15-1.el7ev.noarch.rpm | SHA-256: 9d69a57b9f345ee736e3f7c465795a288b60efec22acba5dc1ed2b7c74deb80c |
vdsm-hook-vmfex-dev-4.19.15-1.el7ev.noarch.rpm | SHA-256: 5301c9ba4739e3ab21903728fa844953ac2c55366a579cd2071bebd80ebd4ad3 |
vdsm-jsonrpc-4.19.15-1.el7ev.noarch.rpm | SHA-256: 5d991df294955911f0b2621e241392e63e262940e0c5ca94e7cbb66938918f9b |
vdsm-python-4.19.15-1.el7ev.noarch.rpm | SHA-256: d6a04047e32570f235a2cf955355c815b91fda46f73afcb0044a040bbd85f0cb |
vdsm-xmlrpc-4.19.15-1.el7ev.noarch.rpm | SHA-256: 28f0c3e52620e2483dcd3867a6574315112475ecdfa92f5b1d25c93675789c23 |
vdsm-yajsonrpc-4.19.15-1.el7ev.noarch.rpm | SHA-256: 728e230339db35d7c309a97e4c0ae3ab54153fb00ba3d0c142aa1588646db3e1 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.15-1.el7ev.src.rpm | SHA-256: f51625db731e9d68e9806bbbf7b0a9e9555a6ceef6f82ead6a64ff8071e7dce1 |
ppc64le | |
vdsm-4.19.15-1.el7ev.ppc64le.rpm | SHA-256: 2cffdcc01c57f8eff76e958a9c744f5c2bf25b5064d3f8b326db1c214c01b37e |
vdsm-api-4.19.15-1.el7ev.noarch.rpm | SHA-256: 48ccd92a9a62c9862a6d12cc239527f998cfe4987faa4e54f8a7d2e5f7fc657b |
vdsm-cli-4.19.15-1.el7ev.noarch.rpm | SHA-256: bb429e21af32b02a723a9cab5ce6c9600b0dc9267f3a4963fee7629ae1da525b |
vdsm-client-4.19.15-1.el7ev.noarch.rpm | SHA-256: 75b9b08c3f697fcd62b5bc921b1ab88e51288e38d68dd17f4aad0f618eb315ab |
vdsm-hook-ethtool-options-4.19.15-1.el7ev.noarch.rpm | SHA-256: a339b50a15aba960d71f9cff47ac8aae32b31fba0799c041bd06644517b1a576 |
vdsm-hook-fcoe-4.19.15-1.el7ev.noarch.rpm | SHA-256: af91e0308eb60e650d226cb52b2303fec9a09cbbd1040589cbbfb0bae9b27c71 |
vdsm-hook-macspoof-4.19.15-1.el7ev.noarch.rpm | SHA-256: e1e90ebf4c2f60e8b0ba386da113702e02391c410fa00dc694a88f762561f71c |
vdsm-hook-openstacknet-4.19.15-1.el7ev.noarch.rpm | SHA-256: 7da1e83b4f5ae51343ca743f7fe6de693367d8c72ec1a46f9abe4236f4577b87 |
vdsm-hook-vhostmd-4.19.15-1.el7ev.noarch.rpm | SHA-256: 9d69a57b9f345ee736e3f7c465795a288b60efec22acba5dc1ed2b7c74deb80c |
vdsm-hook-vmfex-dev-4.19.15-1.el7ev.noarch.rpm | SHA-256: 5301c9ba4739e3ab21903728fa844953ac2c55366a579cd2071bebd80ebd4ad3 |
vdsm-jsonrpc-4.19.15-1.el7ev.noarch.rpm | SHA-256: 5d991df294955911f0b2621e241392e63e262940e0c5ca94e7cbb66938918f9b |
vdsm-python-4.19.15-1.el7ev.noarch.rpm | SHA-256: d6a04047e32570f235a2cf955355c815b91fda46f73afcb0044a040bbd85f0cb |
vdsm-xmlrpc-4.19.15-1.el7ev.noarch.rpm | SHA-256: 28f0c3e52620e2483dcd3867a6574315112475ecdfa92f5b1d25c93675789c23 |
vdsm-yajsonrpc-4.19.15-1.el7ev.noarch.rpm | SHA-256: 728e230339db35d7c309a97e4c0ae3ab54153fb00ba3d0c142aa1588646db3e1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.