- Issued:
- 2016-07-27
- Updated:
- 2016-07-27
RHBA-2016:1507 - Bug Fix Advisory
Synopsis
Red Hat Enterprise Virtualization Manager (rhevm) bug fix 3.6.8
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated RFE packages that fix several bugs and add various enhancements are now available.
Description
The Red Hat Enterprise Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.
The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).
Changes to the rhevm component:
- Previously, cluster compatibility version upgrades were blocked if there was a running virtual machine in the cluster. Now, the user is informed about running/suspended virtual machines in a cluster when changing the cluster version. All such virtual machines are marked with a Next Run Configuration symbol to denote the requirement for rebooting them as soon as possible after the cluster version upgrade. (BZ#1356194)
- Previously, when the Manager tried to prestart a VM from a VM Pool, it was possible that a user could try to manually run the same VM at the same time. In this case, the User Portal displayed an 'Internal error' message. This issue has now been fixed so that it is not possible for a user to run the same VM that is being prestarted by the Manager at the same time. (BZ#1350403)
- With this enhancement, support for SNMP v3 traps was added. RHEV-M is now able to provide SNMP v2c and v3 traps. New SNMP related options which can be set along with the default values can be found at: /usr/share/ovirt-engine/services/ovirt-engine-notifier/ovirt-engine-notifier.conf. (BZ#1348933)
- Previously, administrator permissions were required to create a virtual machine from a template that included custom properties or dedicated hosts. This meant that users without administrator permissions were unable to create virtual machines from a template that included custom properties or dedicated hosts. Now, users without administrator permissions are able to create virtual machines from a template with custom properties or dedicated hosts, as long as the custom properties or dedicated hosts do not differ from those in the template. (BZ#1350223)
- The Manager no longer sends Kernel Same-Page Merging (KSM) across nodes to Red Hat Enterprise Virtualization 3.5 hosts. The Memory Overcommit Manager (MoM) was enhanced to support KSM across nodes in Red Hat Enterprise Virtualization 3.6. However, Red Hat Enterprise Virtualization 3.5 does not have the necessary defaults for it, which means a Red Hat Enterprise Virtualization 3.5 host's MoM policy evaluation fails when the version 3.6 Manager is configured to use the host in 3.5 compatibility mode. (BZ#1339126)
- Previously, there was a race between the automatic startup of prestarted VMs in a VM pool and manual operations on VMs in the pool. This caused some VMs to lose their disks while being returned to the VM pool. Now, the race has been prevented, so disks are no longer removed when the automatic prestart mechanism is executed in parallel. (BZ#1348950)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 3.6 x86_64
Fixes
- BZ - 1149701 - [scale] scheduling on large scale setup running too long, impact on single start vm
- BZ - 1339126 - mom.log shows "undefined symbol ksmMergeAcrossNodes" continuously if connected to RHEV-M 3.6
- BZ - 1340932 - [z-stream clone 3.6.8] It's possible to remove inherited permissions from Everyone's group
- BZ - 1345779 - [downsream clone - 3.6.8] If connection issues happened, fallback to XMLRPC protocol is much faster than expected
- BZ - 1346247 - Not getting all-content for /api/clusters/search
- BZ - 1347337 - [downstream clone - 3.6.8] Host deploy fails (from time to time!) on KeyExchange signature verification failed
- BZ - 1348449 - [downsream clone - 3.6.8] satellite 6.2 changed katello API, incompatible with RHEV 3.6.7
- BZ - 1348920 - [z-stream clone - 3.6.8] Can't assign static ip for a network that is attached to the same interface as the management network
- BZ - 1348933 - [z-stream clone - 3.6.8] [RFE] RHEV Manager support for SNMPv3 traps
- BZ - 1348950 - [z-stream clone - 3.6.8] Pool VM loses its disk during reinitialisation after shutdown.
- BZ - 1350223 - [downsream clone - 3.6.8] User can't create a VM. No permission for EDIT_ADMIN_VM_PROPERTIES
- BZ - 1350403 - [z-stream clone - 3.6.8] User portal reports Internal error when taking a pool VM
- BZ - 1350767 - [z-stream clone - 3.6.8] [SCALE] DB deadlock in updatedisk_image_dynamic_by_disk_id_and_vm_id, slowing down engine.
- BZ - 1356194 - During cluster level upgrade - warn and mark VMs as pending a configuration change when they are running
CVEs
(none)
Red Hat Virtualization 3.6
SRPM | |
---|---|
rhevm-3.6.8.1-0.1.el6.src.rpm | SHA-256: ae5c495e554ed00ea84d905c194e28b0258a6f67dab3d86a85ecb745a24c54b1 |
x86_64 | |
rhevm-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 5a7fa674d25e9227d1a1512cb9f44e9bcb87b29345eaea56dc67d40e76ee5d22 |
rhevm-backend-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: d046a911f256bcf185f859971828023b171ecaa41f3580a287478bd96a3873cd |
rhevm-dbscripts-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 3c71e9b9b370272b1205036f2e61c0cc4635c794bd03fbc756d3b41752bdc549 |
rhevm-extensions-api-impl-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 04cac4eedc1433c814535021734baa54978c13e7832ec8d8335600d8c513b911 |
rhevm-extensions-api-impl-javadoc-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: a0ebbfb0dd6322fb16f5134b0378f4a6447a1a0545506ab9cef283a8ae8b8263 |
rhevm-lib-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: e4bfe79cce3d9baad43014a933fd410dec5ded4819fd4e9135c9a9fcd025d977 |
rhevm-restapi-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 1b346d8e609f27d6c63ae396a9d282684156889488a077604d7e8a1da2aca4e2 |
rhevm-setup-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 7e42fec88ab0aa46171e8710bc677500a185048b4a1da2f6700865893f4ad2a5 |
rhevm-setup-base-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 84002f9943be8aa22ad7ba144f4dd850fb60cfc89c847b971a45160b20602499 |
rhevm-setup-plugin-ovirt-engine-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: e79aaabb498136492b07a87e9d347f91b948eca272992cfab66872f8294c49a5 |
rhevm-setup-plugin-ovirt-engine-common-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: ccfc4e4831af25fc9fdd2bd410baf269031924001c301165ff5c72e42a629770 |
rhevm-setup-plugin-vmconsole-proxy-helper-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 1fd11841398d8ccca27f3248fba8eed78bded005c3603644b40952d97f36c643 |
rhevm-setup-plugin-websocket-proxy-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 8157af34a873d6e27d94a03557df2591ca6df691cb57a5d78ae74e40f51ab2a9 |
rhevm-tools-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 06ae89e4c1722289832928d5dc9a370cc36d6b877461cfc5dcb1571e67632108 |
rhevm-tools-backup-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 011a896501ed3f4acd8bd319397772cb3eacebe8523c31e85ea4edab205d8848 |
rhevm-userportal-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 59e0aa8ba328f5b0416d49961da2b7483d7b117779df405c4889ce4f0e2b08be |
rhevm-userportal-debuginfo-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 8c81471317936652f0d104f0044dae77db66fbf24e87be74f5115c822bf65b38 |
rhevm-vmconsole-proxy-helper-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 506b99d9addd6720b1bc86865d9df51fce675b48857cac50d0683e3d9657ac57 |
rhevm-webadmin-portal-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: 8df3d790378708ad7d49c4ec45b3141c1269a2cd4596c210ace903e7401dd592 |
rhevm-webadmin-portal-debuginfo-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: ddf0ae561700d57f48d52c83ddeca26189dc95e2f7a8081bf679d625a2ca85b1 |
rhevm-websocket-proxy-3.6.8.1-0.1.el6.noarch.rpm | SHA-256: b6e3704177648cbc13a8d1769b47e637e951ebe562c25d754963280b46704b4b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.