- Issued:
- 2015-05-11
- Updated:
- 2015-05-11
RHBA-2015:0956 - Bug Fix Advisory
Synopsis
Red Hat Enterprise Virtualization Manager 3.5.1-1 Async update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat Enterprise Virtualization Manager 3.5.1-1 is now available.
Description
Red Hat Enterprise Virtualization Manager is a visual tool for centrally
managing collections of virtual servers running Red Hat Enterprise Linux and
Microsoft Windows. This package also includes the Red Hat Enterprise
Virtualization Manager API, a set of scriptable commands that give
administrators the ability to perform queries and operations on Red Hat
Enterprise Virtualization Manager.
The Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and interacted
with, including an Administration Portal, a User Portal, and a Representational
State Transfer (REST) Application Programming Interface (API).
Changes to the ovirt-engine-backend component:
- Previously, when importing an existing, clean storage domain that contains
OVF_STORE disks from an old setup to an uninitialized data center, the OVF_STORE
disks did not get registered after the data center was initialized and all
virtual machine information was lost. With this update, when importing clean
storage domains to an uninitialized data center, the OVF_STORE disks are
registered correctly, and new unregistered entities are available in the
Administration Portal under the Storage tab. In addition, storage domains with
dirty metadata cannot be imported to uninitialized data centers. (BZ#1218733)
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 3.5 x86_64
Fixes
- BZ - 1218733 - Importing storage domains into an uninitialized datacenter leads to duplicate OVF_STORE disks being created, and can cause catastrophic loss of VM configuration data
CVEs
(none)
References
(none)
Red Hat Virtualization 3.5
SRPM | |
---|---|
rhevm-3.5.1.1-0.1.el6ev.src.rpm | SHA-256: 1ab841ce5ee65d393fe312b216bb73b9379a61b28c6cf3ed352beff42a12d3e7 |
x86_64 | |
rhevm-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: fa22c7762af840c9a08d015477b9a599d7cea99e4efa0141d535a254e191712c |
rhevm-backend-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 09682d3cd5c6e05811fc5c6789552797cf55bba713305bbb49fcdd99c5dcb30e |
rhevm-dbscripts-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: f43adc812718c156badbac423e592c528209f70e790a1634b27b8a54c084a601 |
rhevm-extensions-api-impl-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: b12618f90022ab12edc6fe44b6a413e2ffd4c505ff03bf906ddb91e62f7355ca |
rhevm-extensions-api-impl-javadoc-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 10009b61e905d09c5d87453578ae94271759de30aec222169543f4f99dee607b |
rhevm-lib-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 3f0baa16db8478858479db3a4714d5806556ae847b205ab3affdaa24f054fe98 |
rhevm-restapi-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 51750a18183f3935d24dd8a751c93b55c7bbd1ab66cf252fe3a629b75bf7679d |
rhevm-setup-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 3ab2d3223177a2f9faca91c95defb42cfc6bb39b2eb5047f08326970dc15303e |
rhevm-setup-base-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 1008e9c1656bd7a086595a43f30e79fd2577b43129438d45031204e492fb9078 |
rhevm-setup-plugin-allinone-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: a58b05df9af5af9fc723e08f9ff206bd941e526aa04e99e1416e1134078ce8ab |
rhevm-setup-plugin-ovirt-engine-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 071618cc9132f17157d28c77ccec2e4ee71b7a0aca1badc926b757649b5c5918 |
rhevm-setup-plugin-ovirt-engine-common-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 26fe29728b3dc4b0f43b5a77588aeb0d5fd0a0d99aa556a9d3c9e5e6088129c6 |
rhevm-setup-plugin-websocket-proxy-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: d7c3ddadc74deb6d4bb8d5c3c3b7532d323f9dd58cbbaf2135b795a9e9ef3671 |
rhevm-tools-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: e8801147801a3f0b623f867934e0ff286f7b35cb50373b9c4325c471d2b4c403 |
rhevm-userportal-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 6274a9c15250974b3224341a502805e236b062acd84c5278972361ddd217a321 |
rhevm-userportal-debuginfo-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 267cafd9e3dd4ef1af753b59ff7be989b6b7a107e9537cbaa2a5452b0e429a03 |
rhevm-webadmin-portal-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: 1b2e0015af0d06278f996db2809460769f56ff71ed368e3f64375ec8ee0a60bb |
rhevm-webadmin-portal-debuginfo-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: e724ccf1f3a25d81561f8d9078e25e5490640a71306562207e2a89c03358ead1 |
rhevm-websocket-proxy-3.5.1.1-0.1.el6ev.noarch.rpm | SHA-256: b77fdf65d5f6cc2e7831ae2198f32cc3a1353e48696487e120f4d42528e393c9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.