- Issued:
- 2017-08-08
- Updated:
- 2017-08-08
RHBA-2017:2433 - Bug Fix Advisory
Synopsis
virt-who bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated virt-who packages that fix one bug are now available for Red Hat Enterprise Linux 7 Extended Update Support.
Description
The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate.
This update fixes the following bug:
- Previously, the virt-who service expected an outdated data format from the hypervisor check-ins. Consequently, virt-who in some cases failed to send the guest-hypervisor mappings and logged a "KeyError: 'guestIds'" message. The data format expected by virt-who has been updated, which prevents the described problem from occurring. (BZ#1462942)
Users of virt-who are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.3 x86_64
- Red Hat Enterprise Linux Server - AUS 7.3 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le
- Red Hat Enterprise Linux Server - TUS 7.3 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.3 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.3 x86_64
Fixes
- BZ - 1462942 - "KeyError: 'guestIds'" occurs after trigger guest when virt-who run against stage candlepin 2.0
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
x86_64 | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
Red Hat Enterprise Linux Server - AUS 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
x86_64 | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
s390x | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
ppc64 | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
ppc64le | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
Red Hat Enterprise Linux Server - TUS 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
x86_64 | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
ppc64le | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.3
SRPM | |
---|---|
virt-who-0.17-13.el7_3.src.rpm | SHA-256: af12a9055aa7332e5e7ac4371163bef0a57ef15b95973545f17e7a08a264d2f4 |
x86_64 | |
virt-who-0.17-13.el7_3.noarch.rpm | SHA-256: 699542c69280be7085451cfeb89f2dbf0678a58c3e430f7fedb5b8600c2fbace |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.