- Issued:
- 2010-01-13
- Updated:
- 2010-01-13
RHBA-2010:0031 - Bug Fix Advisory
Synopsis
rhn-virtualization bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update of rhn-virtualization package fixing several bugs is now
available.
Description
The rhn-virtualization package provides several Red Hat Network and RHN
Satellite actions for manipulating virtual machine guest images.
These updated rhn-virtualization packages provide fixes for the following
bugs:
- the rhn-virtualization package defines a cron job that runs on the host
operating system and polls the changes in status of all running guests and
reports those updates to Red Hat Network or RHN Satellite. The release of
the rhn-virtualization packages, version 5.30.12 for Red Hat Enterprise
Linux 5, introduced a change in the way the cron job detects guest VM
status changes, which led to more frequent updates. However, Red Hat
Network/RHN Satellite treat overly-frequent client updates as abuses of
service, upon detection of which they disable the accounts of infringing
system(s) for a certain period of time. This rhn-virtualization update
restores the previous interval of guest VM polling, thereby preventing the
frequency of status reports from causing RHN to consider the status updates
as abuses of service. (BZ#546676)
- previously, it was possible to update the rhn-virtualization-host package
to a newer version without simultaneously updating the
rhn-virtualization-common package, which could have caused errors due to
constants being referenced which were defined only in the latest package.
This update includes an updated spec file that requires a specific version
of the rhn-virtualization-common package, which prevents package version
mismatches from occurring. (BZ#550328)
All users of rhn-virtualization are advised to upgrade to these updated
packages, which resolve these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
yum update rhn-virtualization-common rhn-virtualization-host
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
Fixes
- BZ - 546676 - frequent status updates from virtualization/poller.py resulting into 'Abuse of Service' messages
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
x86_64 | |
rhn-virtualization-common-5.3.0-15.el5sat.noarch.rpm | SHA-256: b7e5b0839ff98d2b1f1c1ae3b9fb36b60e3325fb1fe0e67c259804a6aa14a1be |
rhn-virtualization-host-5.3.0-15.el5sat.noarch.rpm | SHA-256: 56627b1a5f0e6cf8b5466ec22efbbdeea1642521fcf80e7df83f8d99c014e052 |
ia64 | |
rhn-virtualization-common-5.3.0-15.el5sat.noarch.rpm | SHA-256: b7e5b0839ff98d2b1f1c1ae3b9fb36b60e3325fb1fe0e67c259804a6aa14a1be |
rhn-virtualization-host-5.3.0-15.el5sat.noarch.rpm | SHA-256: 56627b1a5f0e6cf8b5466ec22efbbdeea1642521fcf80e7df83f8d99c014e052 |
i386 | |
rhn-virtualization-common-5.3.0-15.el5sat.noarch.rpm | SHA-256: b7e5b0839ff98d2b1f1c1ae3b9fb36b60e3325fb1fe0e67c259804a6aa14a1be |
rhn-virtualization-host-5.3.0-15.el5sat.noarch.rpm | SHA-256: 56627b1a5f0e6cf8b5466ec22efbbdeea1642521fcf80e7df83f8d99c014e052 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
x86_64 | |
rhn-virtualization-common-5.3.0-15.el5sat.noarch.rpm | SHA-256: b7e5b0839ff98d2b1f1c1ae3b9fb36b60e3325fb1fe0e67c259804a6aa14a1be |
rhn-virtualization-host-5.3.0-15.el5sat.noarch.rpm | SHA-256: 56627b1a5f0e6cf8b5466ec22efbbdeea1642521fcf80e7df83f8d99c014e052 |
i386 | |
rhn-virtualization-common-5.3.0-15.el5sat.noarch.rpm | SHA-256: b7e5b0839ff98d2b1f1c1ae3b9fb36b60e3325fb1fe0e67c259804a6aa14a1be |
rhn-virtualization-host-5.3.0-15.el5sat.noarch.rpm | SHA-256: 56627b1a5f0e6cf8b5466ec22efbbdeea1642521fcf80e7df83f8d99c014e052 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
x86_64 | |
rhn-virtualization-common-5.3.0-15.el5sat.noarch.rpm | SHA-256: b7e5b0839ff98d2b1f1c1ae3b9fb36b60e3325fb1fe0e67c259804a6aa14a1be |
rhn-virtualization-host-5.3.0-15.el5sat.noarch.rpm | SHA-256: 56627b1a5f0e6cf8b5466ec22efbbdeea1642521fcf80e7df83f8d99c014e052 |
i386 | |
rhn-virtualization-common-5.3.0-15.el5sat.noarch.rpm | SHA-256: b7e5b0839ff98d2b1f1c1ae3b9fb36b60e3325fb1fe0e67c259804a6aa14a1be |
rhn-virtualization-host-5.3.0-15.el5sat.noarch.rpm | SHA-256: 56627b1a5f0e6cf8b5466ec22efbbdeea1642521fcf80e7df83f8d99c014e052 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.