Bug Fix Advisory rhev-hypervisor5 bug fix update

Advisory: RHBA-2013:0143-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-08
Last updated on: 2013-01-08
Affected Products: Red Hat Enterprise Virtualization


An updated rhev-hypervisor5 package that fixes various bugs is now available.

The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent.

Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.

This updated package provides updated components that include fixes for various
security issues. These issues have no security impact on Red Hat Enterprise
Virtualization Hypervisor itself, however. The security fixes included in this
update address the following CVE numbers:

CVE-2012-2372, CVE-2012-3552, CVE-2012-4508, CVE-2012-4535, CVE-2012-4537, and
CVE-2012-5513 (kernel issues)

CVE-2012-2693 (libvirt issue)

CVE-2012-2141 (netsnmp issue)

CVE-2011-4339 (OpenIPMI issue)

This update fixes the following bugs:

* Previously attempts to change the root user's password resulted in a "device
busy" error on the "/etc/shadow/" file. This occurred because multipathd held a
lock on the file. The script that changes the password now restarts multipathd
to release the lock, avoiding the "device busy" error (BZ#750149).

* Re-registration of a Hypervisor to Red Hat Network would fail due as a result
of required files being kept open by multipath daemon (multipathd). The daemon
is now restarted at the appropriate moment in the process, preventing this
failure from occurring (BZ#769953).

* Previously when registering to SAM the Hypervisor would not retrieve the SAM
certificate. As a result registration to the SAM would not complete
successfully. The Hypervisor has been updated and the text user interface will
now retrieve the certificate and complete registration successfully (BZ#786049).

Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.


Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

To upgrade Hypervisors in Red Hat Enterprise Virtualization
2.2 environments using the disk image provided by this package, refer to:


To upgrade Hypervisors in Red Hat Enterprise Virtualization
3.0 environments using the disk image provided by this package, refer to:


Updated packages

Red Hat Enterprise Virtualization

File outdated by:  RHBA-2013:0181
    MD5: 2aadcd4a72f6e3c8b27c6da95140bf6f
SHA-256: e8ca133501832565418d031244e97788597d4b9677a653e1ad4b32fc2ceec166
File outdated by:  RHBA-2013:0181
    MD5: 7c8c388b02ef4e5868bdbf738d43c671
SHA-256: 8a56a20104267cb7899742e3515cbd0dd54a88ff89bc187b903de4e0f988289e
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

750149 - change root's passwd in setup report "/etc/shadow" device busy
783067 - Spelling mistake when register to RHN
786049 - RHEV-H register to SAM failed via interactive UI.
786055 - Restart multipathd daemon should run in a background operation, should not display in screen
849054 - RHEV-H report "Error registering to RHN account" even if register to SAM successful.
864819 - virt-who CLI cannot work properly in RHEV-H build
864915 - Cannot persist: /var/lib/rhsm/productid.js when register RHEV-H to SAM.


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/