- Issued:
- 2016-02-29
- Updated:
- 2016-02-29
RHBA-2016:0315 - Bug Fix Advisory
Synopsis
Red Hat Enterprise Virtualization Manager 3.5.8 update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat Enterprise Virtualization Manager 3.5.8 is now available.
Description
Red Hat Enterprise Virtualization Manager is a tool for centrally
managing collections of virtual machines running Red Hat Enterprise Linux
or Microsoft Windows. This package also includes the Red Hat Enterprise
Virtualization Manager API, a set of scriptable commands that give
administrators the ability to perform queries and operations on Red Hat
Enterprise Virtualization Manager.
The Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and interacted
with, including an Administration Portal, a User Portal, and a Representational
State Transfer (REST) Application Programming Interface (API).
Changes to the ovirt-engine component:
- A non-administrator user is automatically granted virtual machine ownership
when creating the virtual machine. Previously, this was also done for virtual
machine pools, which designated the virtual machine as occupied, and prevented
other users from taking it. This issue was fixed and now ownership of pooled
virtual machines is not granted automatically. (BZ#1301867)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3.5 x86_64
Fixes
- BZ - 1220128 - New Template dialog too narrow when quota is enabled
- BZ - 1301866 - Change CD incorrectly rejecting isos with uppercase extensions (ISO vs iso)
- BZ - 1301867 - Pool VMs get UserVmManager role assigned automatically
- BZ - 1302776 - [z-stream clone - 3.5.8] Spice vm console fails because servlet pki-resource is unavailable
CVEs
(none)
References
(none)
Red Hat Virtualization 3.5
SRPM | |
---|---|
rhevm-3.5.8-0.1.el6ev.src.rpm | SHA-256: ddf1ca8abd793ed26fc6ef4f806f7c90e2fe19fdd223451500b38b6d27835abc |
x86_64 | |
rhevm-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 803e9140608392a54397f577ee382df18e3eefb249ed565eae5f179b2288fa7a |
rhevm-backend-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: bfae8aa3ae507466923f860e0836d5cc7765f27e93cf7db9adeda3ae971322ec |
rhevm-dbscripts-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: eea6b7fadd3f594e6fd5f9225d686159e5d78847fd0f984a2bc75dc866db651f |
rhevm-extensions-api-impl-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 5bcfede57d579764c3c8f6bfc1dbe4b14d1b476ae48ea2ed142e93a4eca8bbe6 |
rhevm-extensions-api-impl-javadoc-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 8b5f220c50214e9630daef6192b02cb8a498347e4a89709f648093091e30695d |
rhevm-lib-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 6dc25aee2d03fa7a1a7f15bf5295ca8876262b6deec2b992c6481bff1638f9a0 |
rhevm-restapi-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 0e513f9a7444c94d3a79090f35ecc15f8de9658a4d9dedfea51a91a2f78b0c99 |
rhevm-setup-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: e3883d73708efc5e0dde440736f8866ededc72f0f8f854504ac42a98edb66bd4 |
rhevm-setup-base-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: bf2383da55ccf4c9c4475e53709b8db6433474e2e309b4d6067575c081e16db4 |
rhevm-setup-plugin-allinone-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 857a9056d9cd4079d0556bc53dbd93eb472d88d2d10112f48c251ea55318ad65 |
rhevm-setup-plugin-ovirt-engine-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 7f2be612f6c21f4c0fb9f76ec9fbc507f82ebf9c04ab93a30c11f68efcf41c9e |
rhevm-setup-plugin-ovirt-engine-common-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 4c435ff86d4da555bc0e340fd2e64c2b20ca8f2df4fd478af4b91539ba1e8174 |
rhevm-setup-plugin-websocket-proxy-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: b7637cd6fda1bd33ff5f07777c8a32dc8b055c8fb4f4fd8b61bc4d476178e097 |
rhevm-tools-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: e222e02f5b1abe7753ea76b4bd30fd77c6e398df72b37d19fcf30c94f58c24e3 |
rhevm-userportal-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 405ccd5a675c787af6d67bea3379c786c7715c302c93aa34473c72983b183bdb |
rhevm-userportal-debuginfo-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 7c0eca57d90a29fd11d3b205184b5d4d75af2b7f99f36868ffb8d711a94cffab |
rhevm-webadmin-portal-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 62b95063eedd8d77029b692cd58a8da3f260d23659e3ed5ac57a4216a7412e10 |
rhevm-webadmin-portal-debuginfo-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: 0a51fd3ffcd22008ee4a1e1fc4d2830778ddbff8fb97416687de201f7b38acdc |
rhevm-websocket-proxy-3.5.8-0.1.el6ev.noarch.rpm | SHA-256: e54d1e2a28bbf522693a62ca85870a40a5897ef55207c536fcc935b845600054 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.