- Issued:
- 2012-11-06
- Updated:
- 2012-11-06
RHBA-2012:1425 - Bug Fix Advisory
Synopsis
ovirt-node bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated ovirt-node package that fixes various bugs is now available.
Description
The ovirt-node package provides the utilities and recipes used to create and
configure the Red Hat Enterprise Virtualization Hypervisor ISO image.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
This updated ovirt-node package fixes these bugs:
- The rhev-hypervisor6 package now provides glusterfs, glusterfs-devel,
glusterfs-fuse, and glusterfs-rdma packages. These packages enable the
storing of Red Hat Enterprise Virtualization virtual machine images in a
Red Hat Storage Server pool. (BZ#865712)
- Updates to the Red Hat Enterprise Virtualization Hypervisor tools were
delivered under two different package names: rhev-hypervisor-tools and
rhev-hypervisor6-tools. This resulted in an infinite loop, because updates
to rhev-hypervisor6-tools rendered rhev-hypervisor-tools obsolete, and vice
versa. The rhev-hypervisor6-tools package is now obsolete, so only
rhev-hypervisor-tools updates are installed. (BZ#866480)
- A previous update removed the sch_ingress.ko module, so port mirroring
could not be enabled on virtual machines running on Red Hat Enterprise
Virtualization Hypervisor. This update restores the sch_ingress.ko module,
so port mirroring now works as expected. (BZ#867466)
- Previously, the rhev-hypervisor package shipped a default, self-signed
VDSM key and certificate. Now, the certificate is not shipped with the
ovirt-node package. ovirt-node generates the certificate upon first boot,
and persists all certificates in the /etc/pki/vdsm directory across
multiple reboots. (BZ#867470)
- On completion of Hypervisor upgrades the Hypervisor is rebooted.
Previously this reboot was performed from within the shell session
responsible for performing the upgrade. This resulted in the status of the
host being listed in the Manager as "Install Failed" - even when the
upgrade was successful. The rhev-hypervisor6 package has been updated. On
upgrades the shell session is now allowed to finish gracefully while the
reboot is initiated in the background. (BZ#867562)
This update is included in the build of the rhev-hypervisor6 package
associated with errata RHBA-2012:1424:
https://rhn.redhat.com/errata/RHBA-2012-1424.html
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which corrects these issues and adds these
enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
To upgrade Hypervisors in Red Hat Enterprise Virtualization
2.2 environments using the disk image provided by this package, refer to:
To upgrade Hypervisors in Red Hat Enterprise Virtualization
3.0 environments using the disk image provided by this package, refer to:
Affected Products
- Red Hat Virtualization 6 x86_64
Fixes
- BZ - 866480 - fix obsoletes directive for rhev-hypervisor-tools
- BZ - 867466 - Port mirroring is not working on RHEVH as some modules are missing
- BZ - 867562 - Upgrade script should successfully terminate before reboot occurs
CVEs
(none)
Red Hat Virtualization 6
SRPM | |
---|---|
ovirt-node-2.3.0-15.el6_3.13.src.rpm | SHA-256: c23adc9a15610fbd8fee641c680b039cb979906238a5bf4ade9e86833fb14aad |
x86_64 | |
ovirt-node-recipe-2.3.0-15.el6_3.13.noarch.rpm | SHA-256: ea35ab854161cfc6b7d09e1158511427823b7674a0f4369f33f172e22bca92d8 |
ovirt-node-tools-2.3.0-15.el6_3.13.noarch.rpm | SHA-256: 4d759b77595afd95972ca45a83e78de1d8817aa194c77032dccd45908019c260 |
rhev-hypervisor-tools-2.3.0-15.el6_3.13.noarch.rpm | SHA-256: 3d2db419b020bb5ef2610932bce4b26ebf6319137000adb8f40b5e6c2534d397 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.