- Issued:
- 2014-07-29
- Updated:
- 2014-07-29
RHBA-2014:0962 - Bug Fix Advisory
Synopsis
ovirt-host-deploy bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-host-deploy packages that fix several bugs and add various
enhancements are now available.
Description
The ovirt-host-deploy packages provide deployment implementation required for
Red Hat Enterprise Virtualization Manager to deploy new hosts. The packages
contain a Python library and Java library used by the Red Hat Enterprise
Virtualization Manager package. These libraries are the core deployment logic.
Changes to the ovirt-host-deploy component:
- Previously, the Red Hat Enterprise Virtualization Manager would report an
error with invalid dmidecode output when attempting to approve a hypervisor,
with the approval operation completing successfully. This was caused by the
logic dmidecode parsing logic, whereby lines prefixed with a '#' - indicating a
comment - would be parsed. Now, this logic has been revised so that lines
prefixed with '#' are not parsed, preventing this error message from appearing.
(BZ#1109342)
- When performing host-deploy, the tuned daemon occasionally does not respond to
restart. To avoid this potential issue, simply stop the tuned daemon on the host
before performing host-deploy. (BZ#1078981)
Users of ovirt-host-deploy are advised to upgrade to these updated packages
which address these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Virtualization 3.4 x86_64
Fixes
- BZ - 1078981 - Stucked tuned service during host deploying
- BZ - 1109342 - "Invalid dmidecode output" alert upon Host approval
CVEs
(none)
References
(none)
Red Hat Virtualization 3.4
SRPM | |
---|---|
ovirt-host-deploy-1.2.2-1.el6ev.src.rpm | SHA-256: 58dc5ecdd5b0adecf336774ca9637dda442a0302aaee28595ba72ade88e82ff9 |
x86_64 | |
ovirt-host-deploy-1.2.2-1.el6ev.noarch.rpm | SHA-256: 076e2fca2888b854a062f3300858f9359b4c019b03abfa7c7a4a29dd45dfcbd1 |
ovirt-host-deploy-java-1.2.2-1.el6ev.noarch.rpm | SHA-256: 8ebe958008390e5575f7605b3d0fb247edb7fe0f722f5741d8bc4bff22a2506f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.