- Issued:
- 2016-06-27
- Updated:
- 2016-06-27
RHBA-2016:1342 - Bug Fix Advisory
Synopsis
vdsm 3.5.8 critical bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix a critical bugs
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, when the VDSM service was restarted on a host, the host would still respond to queries from the Manager over JSON-RPC protocol, which could lead to incorrectly reported status of virtual machines in the engine database. In the case of highly available virtual machines, this would cause the virtual machine to be restarted under certain circumstances even though the virtual machine was running. This issue has now been resolved, and API calls are correctly blocked while the VDSM service is starting. (BZ#1344075)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1344075 - [3.5] VM split brain during networking issues
CVEs
(none)
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.16.37-1.el6ev.src.rpm | SHA-256: 71908bac1362485c5a5e2a7fa2699a68ec6c7b73b5d61ac24edf63d1bd353ff1 |
x86_64 | |
vdsm-4.16.37-1.el6ev.x86_64.rpm | SHA-256: 9cbd8d9c195d82f08be27ba5b6423881c9d9a2ef90c867f15bb9714efaa5f877 |
vdsm-bootstrap-4.16.37-1.el6ev.noarch.rpm | SHA-256: 66e4bbbcd81e08a046cca9ee1458d32174e700b34804cfce91fe07aec7e598cf |
vdsm-cli-4.16.37-1.el6ev.noarch.rpm | SHA-256: 111439c9dac6bf31906aa3abfe46bbd0225af656da719924cc66e2fddae5907b |
vdsm-debuginfo-4.16.37-1.el6ev.x86_64.rpm | SHA-256: cf02a63ff0201df7cf9cbf79e423fcc66f7bde880a9a92d494210872ed889cc1 |
vdsm-hook-ethtool-options-4.16.37-1.el6ev.noarch.rpm | SHA-256: 496da45a906f724bb71fe53505cd0c8f6930b1ac58835b53438e18b15b0c3624 |
vdsm-hook-macspoof-4.16.37-1.el6ev.noarch.rpm | SHA-256: 6a5138af741a759032f4a723e0f9772b4a09c7e7735f958d5aa4c2df78968e6c |
vdsm-hook-openstacknet-4.16.37-1.el6ev.noarch.rpm | SHA-256: 2a9f22aadbeeff5ab4c3f0232a2e4369eec719979dbdfd58e480adecd8c96a81 |
vdsm-hook-vhostmd-4.16.37-1.el6ev.noarch.rpm | SHA-256: 321db83640c528a8dd6999fdac140914b0d4b9864790993c30eefbc26ecc1bca |
vdsm-jsonrpc-4.16.37-1.el6ev.noarch.rpm | SHA-256: c395d451919bbc475ab4edfddbde2fcfa3c03b66a7dfa97e5d76574bd44b5691 |
vdsm-python-4.16.37-1.el6ev.noarch.rpm | SHA-256: 8b89f3fa5acfa4416f8eef7a4b951c0741313f9824be9f444a787d4c8bc203e7 |
vdsm-python-zombiereaper-4.16.37-1.el6ev.noarch.rpm | SHA-256: ee97e89855515f532bdcc42815c1b19e2618a6de16e2af4d61b5b0121f94e655 |
vdsm-reg-4.16.37-1.el6ev.noarch.rpm | SHA-256: e706fb5b6856f85ee0bc8424d5246884b36e15c68e6714f6546579200510938e |
vdsm-xmlrpc-4.16.37-1.el6ev.noarch.rpm | SHA-256: bfa1482ee62bbc3d58103ceff610dce5ac8b76f6cb19d63af9da1f198e7943b1 |
vdsm-yajsonrpc-4.16.37-1.el6ev.noarch.rpm | SHA-256: d4d8748c21c554d08b29e76725a0fa1638e5c6ff9bc59b7a7c0ef813bb58f881 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.