Bug Fix Advisory ovirt-guest-agent bug fix and enhancement update for RHV 4.0.7

Advisory: RHBA-2017:0538-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2017-03-16
Last updated on: 2017-03-16
Affected Products: Red Hat Virtualization ( v.4 for RHEL 5)
Red Hat Virtualization ( v.4 for RHEL 6)

Details

Updated ovirt-guest-agent packages that fix several bugs and add various
enhancements are now available.

The ovirt-guest-agent allows the Red Hat Virtualization Manager to receive
internal guest events and retrieve information such as the IP address and list
of installed applications from the guest. Additionally the guest agent allows
the Manager to execute specific commands, such as shut down or reboot, on guest
virtual machines.

Changes to the ovirt-guest-agent component:

* Previously, when virtual machines were stopped during a system shutdown or
reboot they appeared to VDSM as if they had been shut down from within the guest
operating system. This information was sent to the Red Hat Virtualization
Manager and this meant that the Manager did not start highly available virtual
machines on a different host because the Manager considered the the shut down of
the virtual machines to be user-initiated. Now, the Red Hat Virtualization guest
agent allows VDSM to detect that the virtual machine was shut down from within
the system and this means that highly available virtual machines stopped during
a system shutdown are restarted on a different host. (BZ#1389332)


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Updated packages

Red Hat Virtualization ( v.4 for RHEL 5)

SRPMS:
rhevm-guest-agent-1.0.12-6.el5ev.src.rpm     MD5: 5d420093ca22b2395ac65066adb87944
SHA-256: c6653b257aa169c50fa9836c3e2cae06022247ef303cfbad5252d9bcee448398
 
IA-32:
rhevm-guest-agent-1.0.12-6.el5ev.noarch.rpm     MD5: 38ac81d7479403647010c7435e96f400
SHA-256: de8cb4dc9bcb9c5393b56ac3f7c7707ab3c0e1172272dd58da397a1ddb222561
 
x86_64:
rhevm-guest-agent-1.0.12-6.el5ev.noarch.rpm     MD5: 38ac81d7479403647010c7435e96f400
SHA-256: de8cb4dc9bcb9c5393b56ac3f7c7707ab3c0e1172272dd58da397a1ddb222561
 
Red Hat Virtualization ( v.4 for RHEL 6)

SRPMS:
rhevm-guest-agent-1.0.12-4.el6ev.src.rpm     MD5: 45c8bef74c0ee0ead54d4ced6779a841
SHA-256: b3edb751f93def2d0a3323aff24a10cdef0edb5ebadb640f27de20bc3e67a029
 
IA-32:
rhevm-guest-agent-common-1.0.12-4.el6ev.noarch.rpm     MD5: 301202605d86560f14f2980e6116cd5f
SHA-256: b14bfee0ef64d069b229a78f72bb0261c5a11ff477621d683ebd1a4db022954f
rhevm-guest-agent-gdm-plugin-1.0.12-4.el6ev.i686.rpm     MD5: 86e16d404180cd2a99b04196f493e6bb
SHA-256: 2404caa60dcedbbe71723c2ef23796063ec7557ed13ce7b4a27188d974a1abb8
rhevm-guest-agent-kdm-plugin-1.0.12-4.el6ev.i686.rpm     MD5: c25f79d3fe89c5f5371165f6d72b3de6
SHA-256: 2cb37a145cf9c18d6d63c7498ab37e8477a3a0e4c52f077093981a77688e866b
rhevm-guest-agent-pam-module-1.0.12-4.el6ev.i686.rpm     MD5: 6ff45ba4552a9eda6c2a1fcc1a767a77
SHA-256: 1d124646e881be7e939d0012bb22a27da1f297fa0ec930964b1ebfeb8b99472c
 
x86_64:
rhevm-guest-agent-common-1.0.12-4.el6ev.noarch.rpm     MD5: 301202605d86560f14f2980e6116cd5f
SHA-256: b14bfee0ef64d069b229a78f72bb0261c5a11ff477621d683ebd1a4db022954f
rhevm-guest-agent-gdm-plugin-1.0.12-4.el6ev.x86_64.rpm     MD5: 8aa6147a3ea04a1ca93b7ba91d521362
SHA-256: 7c83afd93a217997747a51d0c6023d46c606dd526172fc42eee80541026e7db3
rhevm-guest-agent-kdm-plugin-1.0.12-4.el6ev.x86_64.rpm     MD5: 3bef3ec7060831d2b468696f3afc0799
SHA-256: b48467756384fecbfa31103921428bad01ceb2756baa02810a7df46023ef18da
rhevm-guest-agent-pam-module-1.0.12-4.el6ev.x86_64.rpm     MD5: 008209ff6986bd4f1ce216f2874b9f96
SHA-256: 3a4362219c7d4bed13b25da983b4a39684f729b2576bafe2195d511d42489452
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1389332 - [el5][el6][el7-ppc64][el7-ppc64le] HA vms do not start after successful power-management.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/