- Issued:
- 2016-02-29
- Updated:
- 2016-02-29
RHBA-2016:0317 - Bug Fix Advisory
Synopsis
vdsm 3.5.8 - bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now
available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Changes to the vdsm component:
- This release fixes a memory leak in VDSM. (BZ#1299491)
- Previously, in certain cases the MOM component stopped enforcing QoS policies,
KSM, and memory ballooning. This has now been fixed. (BZ#1298190)
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1297414 - vmchannel thread consumes 100% of CPU
- BZ - 1298190 - Vm.status() causes crash of MoM GuestManager
- BZ - 1299235 - [z-stream clone - 3.5.8] Assigning direct LUN fails with error "scsi-block 'lun' devices do not support the serial property"
- BZ - 1299491 - VDSM memory leak
- BZ - 1305586 - [z-stream clone - 3.5.8] Issue with vdsm-hook-vmfex-dev-4.16.33-1 - "InvalidatedWeakRef"
- BZ - 1308626 - CopyImage on iscsi sometimes fails when cloning a vm from snapshot.
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
x86_64 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.16.36-1.el6ev.src.rpm | SHA-256: b36a03ea8155341dd2f105b0d3252129508f18728b93bc378bcce15b6c164715 |
x86_64 | |
vdsm-4.16.36-1.el6ev.x86_64.rpm | SHA-256: 9e60d18fa32b64fb734d28398c6f512146149c369c6b33098ab9a370bbfd8380 |
vdsm-bootstrap-4.16.36-1.el6ev.noarch.rpm | SHA-256: 43201d72a05bd038a10885f64a56c9647d34192ae8c1c4a01e11f5ce61f42c88 |
vdsm-cli-4.16.36-1.el6ev.noarch.rpm | SHA-256: f09afaede5306027cacc16f97da10c8807eb7ee8f117eff1a5c2aca4ae84828a |
vdsm-debuginfo-4.16.36-1.el6ev.x86_64.rpm | SHA-256: 2f77957ef2bc8d1a74fe736350348cb66bd230803a23d5a475ddfa975788c698 |
vdsm-hook-ethtool-options-4.16.36-1.el6ev.noarch.rpm | SHA-256: 3145ec6065a7a3f5f72e35d9b63212b478e8f4b81bbf560587307fceecde2ab9 |
vdsm-hook-macspoof-4.16.36-1.el6ev.noarch.rpm | SHA-256: f441de42969a2dbb600b25b6e05f96a38717d92c0e6e6fd99d89394a5a29fe39 |
vdsm-hook-openstacknet-4.16.36-1.el6ev.noarch.rpm | SHA-256: e72466f970088a80c7d917c867fe3816633b0c34451e8196580539113eaafbd4 |
vdsm-hook-vhostmd-4.16.36-1.el6ev.noarch.rpm | SHA-256: 562c174f7a27838f87512e04e1e6346cf3f2ea9fec8e4a55539faa0a33721b3e |
vdsm-jsonrpc-4.16.36-1.el6ev.noarch.rpm | SHA-256: 20e0401ace0bc71ac88e4897c6ef59428627eb4957c12c20fca4a0147f3ce43e |
vdsm-python-4.16.36-1.el6ev.noarch.rpm | SHA-256: 8e639dc01af3691d713075756ba5cf73d32b0b0aec061bf9aa1dd9f113f87cb8 |
vdsm-python-zombiereaper-4.16.36-1.el6ev.noarch.rpm | SHA-256: dacec078ce601d65d260b0cd9f814c5cb91f438f51fdea71f7025a46095ce542 |
vdsm-reg-4.16.36-1.el6ev.noarch.rpm | SHA-256: 1f9348948f4b6324bc39d1d68dccef2f4ee9b4877acf8bb5107cdaf24b740a4f |
vdsm-xmlrpc-4.16.36-1.el6ev.noarch.rpm | SHA-256: 3c3f42de70b9021edc06d45e72182dc9c3e7001cd3e03ba43aa906ce3f20ba3d |
vdsm-yajsonrpc-4.16.36-1.el6ev.noarch.rpm | SHA-256: 26dafa6f1904d3bbfd8064a5a7cb0a72f98b492778682f6428d76b449d00ed7e |
Red Hat Virtualization for IBM Power LE 3
SRPM | |
---|---|
ppc64le |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.