Updated vdsm packages that fix a bug are now available.

VDSM is a management module that serves as a Red Hat Enterprise VirtualizationManager agent on Red Hat Enterprise Virtualization Hypervisor or Red HatEnterprise Linux hosts.All users managing Red Hat Enterprise Linux Virtualization hosts using Red HatEnterprise Virtualization Manager are advised to install these updated packages.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Virtualization 3

SRPMS:
vdsm-4.14.17-2.el6ev.src.rpm
    MD5: 648f00183534a0a5984cb41840dd53fdSHA-256: e1753ebb457ea530c3132cde67acf01c15276b7080e116bae12a7200e0821702
vdsm-4.14.17-2.el7.src.rpm
    MD5: 6344ca1f12d71d9133f5db923ce5899bSHA-256: 6aae243358a6b50404c6f47d6a210335b371e414477b913d959979da76345dda
 
x86_64:
vdsm-4.14.17-2.el6ev.x86_64.rpm
    MD5: 52bf9777ac1712e1d989781afcefd51fSHA-256: 04b6ba0b3f350b73bc26a80681b9a15b83b179acb9747d29100d52e59413bef9
vdsm-4.14.17-2.el7.x86_64.rpm
    MD5: 14ba78ace1e1fa626086eb3b0cd31ca7SHA-256: f3a6ec0e618aa90df361a692ca0994d5c249715fa262bc36833421d8c62c1bc1
vdsm-cli-4.14.17-2.el6ev.noarch.rpm
    MD5: 8c5d5be1d760bc53d666711bf62c930eSHA-256: 2d56cc423be260b511f009b95513217291437e62b0c10bfd64123817b225a1f2
vdsm-cli-4.14.17-2.el7.noarch.rpm
    MD5: d341cdcccc37ddc7d9969144f1270ef2SHA-256: ae3a31342e1ee02f8a6be1f052213f7042ec0f9b9284ef7461c721db566e9702
vdsm-debug-plugin-4.14.17-2.el7.noarch.rpm
    MD5: a48ceabfa094ead7d15a0a62974f3f02SHA-256: 6bacf1fb5d751669bb6b1db773f1798017e27281f7a637bdaa94b9ff464bc6f2
vdsm-debuginfo-4.14.17-2.el6ev.x86_64.rpm
    MD5: cf7b79554344f4ce7fe713fec66595a6SHA-256: 5cc8dd4f0de5e431a0da450cafaf71a5648c93a1456bd5e75ab63f03b9040c0d
vdsm-hook-vhostmd-4.14.17-2.el6ev.noarch.rpm
    MD5: 680631abe02e675493b77a054879de28SHA-256: e99515e85ada04e96af3b6c929fecd36bdf690f02ef1970d73be91176776f4b4
vdsm-hook-vhostmd-4.14.17-2.el7.noarch.rpm
    MD5: 95b1cd061de1f10c7e92e69380a39893SHA-256: 24a1a3555c7786c8cc769640533ba2f43fcd36804e01577e206dfa950cac8d02
vdsm-python-4.14.17-2.el6ev.x86_64.rpm
    MD5: accd3c61bdbcf99e0b2f483db73e7e8cSHA-256: 445dc34a8c54def69cc341ee75b142bee78fa06b5553b359a2e0634eba5aefaa
vdsm-python-4.14.17-2.el7.x86_64.rpm
    MD5: 4a1318d685c1ba071fcf1fb3505b5170SHA-256: bbade60b133ffe567881aabf3c42b527e855e4b5adb8dfffa8cfa46ee79c8c56
vdsm-python-zombiereaper-4.14.17-2.el6ev.noarch.rpm
    MD5: 3c8cb8b290735692ddab462af22237a5SHA-256: e1bbd3d988eb08e2e05e4601f2385f9f2b69070aff8790a79fabe7e005980ea1
vdsm-python-zombiereaper-4.14.17-2.el7.noarch.rpm
    MD5: 363264276002a2d5d887b094e9dffc03SHA-256: fd90c9687d32f000a5e59084f52d13d2f82026bbc200f2e1cb6904b5fb746851
vdsm-reg-4.14.17-2.el6ev.noarch.rpm
    MD5: 37f64d4353c02eb31c457b64aca7c2dfSHA-256: 216a82bc1794d0ca9d264ba2063f320c1cbc5d9e7188cdc5a11c618414f266c2
vdsm-reg-4.14.17-2.el7.noarch.rpm
    MD5: 602528b88becb99b6f23e57717c1cbd6SHA-256: 0c9594f7d578a534128846034c77400fd7c159732fd23c65520bb0558fccf53a
vdsm-xmlrpc-4.14.17-2.el6ev.noarch.rpm
    MD5: 66c7312eed8f607f9c2c30794240dc01SHA-256: 1adcf1b317a2f3dea9d89f3121b31b4cbd5fd042732d85dc13bb736e28a485fe
vdsm-xmlrpc-4.14.17-2.el7.noarch.rpm
    MD5: efa92dceef97b4d6c1e6dae2af494724SHA-256: 9b4fa112188d10593d80f7d7b661fbae0547f955a4247e94193897d9b3c37949
 
Red Hat Enterprise Virtualization 3.4

SRPMS:
vdsm-4.14.17-2.el6ev.src.rpm
    MD5: 648f00183534a0a5984cb41840dd53fdSHA-256: e1753ebb457ea530c3132cde67acf01c15276b7080e116bae12a7200e0821702
 
x86_64:
vdsm-bootstrap-4.14.17-2.el6ev.noarch.rpm
    MD5: 43dc1aaf5abb9d2c4f3afb44927acb29SHA-256: 73eedeabd381aa729e3abd8739175e6891b481644ad78bc86c37386010512eae
 
(The unlinked packages above are only available from the Red Hat Network)
1150015 – VM abnormal stop after LV refreshing when using thin provisioning on block storage

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply