- Issued:
- 2014-01-24
- Updated:
- 2014-01-24
RHBA-2014:0094 - Bug Fix Advisory
Synopsis
ovirt-node bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated ovirt-node package that fixes various bugs and contains a number of
enhancements is now available.
Description
The ovirt-node package provides the utilities and recipes used to create and
configure the Red Hat Enterprise Virtualization Hypervisor ISO image.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for the
Intel 64 and AMD64 architectures with virtualization extensions.
This update fixes the following bugs:
- Automatic installation failed to set the hostname, DNS, and NTP parameters.
This was because the migration script was also run on first boot after a clean
installation. Now, the configuration version is set during installation, and
prevents migration runs when it is a fresh installation. As a result, the
hostname, DNS and NTP parameters can be set after automatic installation.
(BZ#1055558)
- Upgrading the hypervisor did not retain some previously configured settings
including hostname, network, logging, and remote storage. All parameters are now
persisted in the TUI after an upgrade. (BZ#1055554)
- The NVR of the hypervisor RPM and the contents of /etc/system-release did not
match, so the Manager prompted users to upgrade the hypervisor even when there
were no updates available. The version information in both locations now match,
so users are only prompted to upgrade when there are new versions available.
(BZ#1055553)
- Previously, an incorrect AES-NI value was displayed in the TUI. The value is
now imported correctly from the configuration files and correctly displayed in
the TUI. (BZ#1057094)
- Previously, ovirt-node-tools had a dependency on appliance-tools-minimizer
which is not shipped in any channel. This caused ovirt-node-tools to fail to
install because of the missing dependency. Now, the dependency has been dropped
and ovirt-node-tools can be installed. (BZ#1057091)
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to upgrade
to this updated package, which corrects these issues and adds these
enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Virtualization 6 x86_64
Fixes
- BZ - 1057091 - ovirt-node-tools requires unavailable appliance-tools
CVEs
(none)
References
(none)
Red Hat Virtualization 6
SRPM | |
---|---|
ovirt-node-3.0.1-18.el6_5.1.src.rpm | SHA-256: 9d69542a286c4a97c3550edf44ca5df09b36a8e0ed9ee5cdd7aac82c6aef033e |
x86_64 | |
ovirt-node-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: 9a1395704cc5aa476b9d61ecc36ca2f2328381d1aed83c3dc902549869c4359c |
ovirt-node-plugin-cim-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: 78b303dfdd919db964fd835f028a0be24da6a90435ff5d0ec5534d3ecd94d8d8 |
ovirt-node-plugin-ipmi-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: cafaa6fb2ee065dbe0e4e74ce2a3a890fc5fecb5cd9612984d87418b6bc28d91 |
ovirt-node-plugin-puppet-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: 752c7a6f6ab42d4cca7bc0bc4be04aca53d7e530ee2cd13c3a541e896f82a4dc |
ovirt-node-plugin-rhn-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: 9119f7449cd9acab2213287297427f235599fdfa761adc24a8cebdf3a3c92e31 |
ovirt-node-plugin-snmp-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: e063d0322a63a5710d54a4321c2a34a3e54d65012dc49c763bd994eae91d96a6 |
ovirt-node-recipe-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: 08f165d32f6232e4dad02d5e0b74aae3be2ff49b2f701711cd8f6344be061ca4 |
ovirt-node-selinux-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: 5aac567923dcbe99e86c87655d43662dc7b287d26303fd560302c2375fce1028 |
ovirt-node-tools-3.0.1-18.el6_5.1.noarch.rpm | SHA-256: c0789f131432a3c0d9e56707cf8d40a5761bf018c7cead9cc0fef6483a08f63d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.