- Issued:
- 2014-09-04
- Updated:
- 2014-09-04
RHBA-2014:1156 - Bug Fix Advisory
Synopsis
ovirt-hosted-engine-setup bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-hosted-engine-setup packages that fix one bug is now available.
Description
The ovirt-hosted-engine-setup package provides a self-hosted engine tool for Red
Hat Enterprise Virtualization Manager. A self-hosted engine is a virtualized
environment in which the Manager runs on a virtual machine on the hosts managed
by the Manager. The self-hosted engine currently only runs on Red Hat Enterprise
Linux 6.5 hosts.
Changes to the ovirt-hosted-engine-setup component:
- Previously, if the NX flag was not checked in the BIOS of certain Intel CPU
types, which require NX as well as VMX to support virtualization, the deployment
script for the self-hosted engine would not accurately detect the CPU type and
the deployment would stall. Now, the user is prompted to check the NX flag in
the system BIOS if the CPU type is not accurately detected, and the deployment
exits gracefully. (BZ#1119145)
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Virtualization 3.4 x86_64
Fixes
- BZ - 1119145 - hosted-engine --deploy does not check for NX flag
- BZ - 1126311 - Rebase ovirt-hosted-engine-setup to upstream 1.1.5
CVEs
(none)
References
(none)
Red Hat Virtualization 3.4
SRPM | |
---|---|
ovirt-hosted-engine-setup-1.1.5-1.el6ev.src.rpm | SHA-256: 02b6c1993c91fcd322a4556f9f0b9c8fa5614fee5e602546d7904909ac645e17 |
x86_64 | |
ovirt-hosted-engine-setup-1.1.5-1.el6ev.noarch.rpm | SHA-256: 611719d03c12026779282ac4ba9ddb89169fd8d3f0b4f88deaa73db885408bb8 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.