- Issued:
- 2013-06-10
- Updated:
- 2013-06-10
RHEA-2013:0914 - Product Enhancement Advisory
Synopsis
rhevm-guest-agent bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rhevm-guest-agent packages that fix several bugs and add various enhancements are now available.
Description
The rhevm-guest-agent allows the Red Hat Enterprise Virtualization Manager to receive internal guest events and retrieve information such as the IP address and list of installed applications from the guest. Additionally the guest agent allows the Manager to execute specific commands, such as shut down or reboot, on guest virtual machines.
This update fixes the following bugs:
- When the host was not connected to the virtio serial port, a pre-uninstall script in the guest agent package blocked the removal of the guest agent. Now, the pre-uninstall script opens the port with the O_NONBLOCK flag, so removing the guest agent does not hang if VDSM was not responding or did not exist prior to the removal. (BZ#929387)
- The rhev-agent package was reported as being installed even when after it had been replaced by the rhevm-guest-agent package. Now, the old package is no longer reported or shown in the administration portal. (BZ#882268)
- After removing the guest agent package, the udev rules were not reapplied, so the /dev/vport01p1 device still was assigned to the ovirtagent user and group. The udev rules are now reset, so /dev/vport01p1 is owned by root:root after removal of the guest agent package. (BZ#882245)
- The restorecon command was not called on the pid file of the daemon. Consequently, SELinux blocked access to the pid file, causing single sign on to fail. This update calls restorecon on the pid file during daemon startup, so single sign on works as expected. (BZ#882239)
- The ovirtagent user's home directory was on root (/) which was not writable for the user, so the login of the ovirtagent failed. As a result, the ovirt-guest-agent service could not run. The ovirtagent user now gets a home directory in /usr/share/ovirt-guest-agent. ovirt-guest-agent now successfully starts when polyinstantiated directories via pam_namespace are configured. (BZ#883124)
- The rhev-agent package has been renamed to rhevm-guest-agent. This package contains the ovirt-guest-agent service, which was previously named rhev-agentd. When upgrading from rhev-agent to rhevm-guest-agent, the ovirt-guest-agent service did not start if the rhev-agentd service was already running, which could interrupt virtual machine processes. The ovirt-guest-agent service is now automatically started even when the rhev-agentd service was running during the upgrade. (BZ#923812)
This update also adds the following enhancements:
- rhevm-guest-agent now has a dependency on the tuned package, which sets an optimized profile for virtual guests running under KVM. (BZ#838439)
- A limitation in the python-ethtool package meant that only the first IPv4 address on a interface was reported. The python-ethtool has been updated and the necessary changes are applied to the guest agent. The guest agent now reports all IPv4 addresses assigned to an interface. (BZ#753121)
- The rhevm-guest-agent package is rebased to version 1.0.7, which allows udev to reset user rights on virtio-channel during package removal, adds support for reporting devices with only ipv6, reports Windows 8 and Windows 2012 operating systems, and replaces agent license to Apache software license (asl) 2.0. (BZ#890273)
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 882239 - SSO doesn't work with rhevm-guest-agent, rhevm-guest-agent-{pam,gdm-plugin}
- BZ - 882245 - After rhevm-guest-agent uninstallation there's still 'ovirtagent' user/group in OS and /dev/vport01p1 still uses 'ovirtagent' uid/gid
- BZ - 882268 - vdsClient reports still old data after upgrade to rhevm-guest-agent on RHEL6 32bit
- BZ - 883124 - ovirt-guest-agent will not run with pam_namespace polyinstantiated directories
- BZ - 923812 - Agent does not run when upgrading from rhev-agent to rhevm-guest-agent
- BZ - 929387 - Send 'uninstalled' notification non blocking
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
rhevm-guest-agent-1.0.7-11.el6ev.src.rpm | SHA-256: ad11f6552e1e5c0eb221256015b10e355282a69c6f173515172c07d9e84d6c15 |
x86_64 | |
rhevm-guest-agent-common-1.0.7-11.el6ev.noarch.rpm | SHA-256: 02860e2f693a4b8bb9d6cbd3278b613877c56a93698930342deb46f2dece6fcc |
rhevm-guest-agent-debuginfo-1.0.7-11.el6ev.x86_64.rpm | SHA-256: abdf9ca5b01aea6c12de234cdfe3963ba4ad04f0dbca1bd7bb9a7cf8bdac1ee2 |
rhevm-guest-agent-gdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 61539e0941470c9503a1acb4467a4e626acf83399482f2a2643a3d59334eaef2 |
rhevm-guest-agent-kdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 494c4dcb792c09c054c6dd4efe8cba104960e82bbeaf3fc6e8bab84b467553f8 |
rhevm-guest-agent-pam-module-1.0.7-11.el6ev.x86_64.rpm | SHA-256: c3ad9406a2843606a52e9e09f443e789e1fd80ba13c72a0daf2e2bd428eb99b1 |
i386 | |
rhevm-guest-agent-common-1.0.7-11.el6ev.noarch.rpm | SHA-256: 02860e2f693a4b8bb9d6cbd3278b613877c56a93698930342deb46f2dece6fcc |
rhevm-guest-agent-debuginfo-1.0.7-11.el6ev.i686.rpm | SHA-256: 83cd8c774b503c47bf62d36379c9f2fc865c61b1f91e9312d73bda7eeb1c3fe1 |
rhevm-guest-agent-gdm-plugin-1.0.7-11.el6ev.i686.rpm | SHA-256: 46d7a6cc44c56be9b630fc0083d11a58d8f2433344850bfbf1b55950fe25d045 |
rhevm-guest-agent-kdm-plugin-1.0.7-11.el6ev.i686.rpm | SHA-256: 903d49a2d95d293105d77694c2d6b4d41884a9ebe1bbf38134be247f4ebcad8c |
rhevm-guest-agent-pam-module-1.0.7-11.el6ev.i686.rpm | SHA-256: 4d71fec192a51ac998033452aee1e56b6ca2c2a7f2de25d72d639dfe6d830d94 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
rhevm-guest-agent-1.0.7-11.el6ev.src.rpm | SHA-256: ad11f6552e1e5c0eb221256015b10e355282a69c6f173515172c07d9e84d6c15 |
x86_64 | |
rhevm-guest-agent-common-1.0.7-11.el6ev.noarch.rpm | SHA-256: 02860e2f693a4b8bb9d6cbd3278b613877c56a93698930342deb46f2dece6fcc |
rhevm-guest-agent-debuginfo-1.0.7-11.el6ev.x86_64.rpm | SHA-256: abdf9ca5b01aea6c12de234cdfe3963ba4ad04f0dbca1bd7bb9a7cf8bdac1ee2 |
rhevm-guest-agent-gdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 61539e0941470c9503a1acb4467a4e626acf83399482f2a2643a3d59334eaef2 |
rhevm-guest-agent-kdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 494c4dcb792c09c054c6dd4efe8cba104960e82bbeaf3fc6e8bab84b467553f8 |
rhevm-guest-agent-pam-module-1.0.7-11.el6ev.x86_64.rpm | SHA-256: c3ad9406a2843606a52e9e09f443e789e1fd80ba13c72a0daf2e2bd428eb99b1 |
i386 | |
rhevm-guest-agent-common-1.0.7-11.el6ev.noarch.rpm | SHA-256: 02860e2f693a4b8bb9d6cbd3278b613877c56a93698930342deb46f2dece6fcc |
rhevm-guest-agent-debuginfo-1.0.7-11.el6ev.i686.rpm | SHA-256: 83cd8c774b503c47bf62d36379c9f2fc865c61b1f91e9312d73bda7eeb1c3fe1 |
rhevm-guest-agent-gdm-plugin-1.0.7-11.el6ev.i686.rpm | SHA-256: 46d7a6cc44c56be9b630fc0083d11a58d8f2433344850bfbf1b55950fe25d045 |
rhevm-guest-agent-kdm-plugin-1.0.7-11.el6ev.i686.rpm | SHA-256: 903d49a2d95d293105d77694c2d6b4d41884a9ebe1bbf38134be247f4ebcad8c |
rhevm-guest-agent-pam-module-1.0.7-11.el6ev.i686.rpm | SHA-256: 4d71fec192a51ac998033452aee1e56b6ca2c2a7f2de25d72d639dfe6d830d94 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
rhevm-guest-agent-1.0.7-11.el6ev.src.rpm | SHA-256: ad11f6552e1e5c0eb221256015b10e355282a69c6f173515172c07d9e84d6c15 |
x86_64 | |
rhevm-guest-agent-common-1.0.7-11.el6ev.noarch.rpm | SHA-256: 02860e2f693a4b8bb9d6cbd3278b613877c56a93698930342deb46f2dece6fcc |
rhevm-guest-agent-debuginfo-1.0.7-11.el6ev.x86_64.rpm | SHA-256: abdf9ca5b01aea6c12de234cdfe3963ba4ad04f0dbca1bd7bb9a7cf8bdac1ee2 |
rhevm-guest-agent-gdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 61539e0941470c9503a1acb4467a4e626acf83399482f2a2643a3d59334eaef2 |
rhevm-guest-agent-kdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 494c4dcb792c09c054c6dd4efe8cba104960e82bbeaf3fc6e8bab84b467553f8 |
rhevm-guest-agent-pam-module-1.0.7-11.el6ev.x86_64.rpm | SHA-256: c3ad9406a2843606a52e9e09f443e789e1fd80ba13c72a0daf2e2bd428eb99b1 |
i386 | |
rhevm-guest-agent-common-1.0.7-11.el6ev.noarch.rpm | SHA-256: 02860e2f693a4b8bb9d6cbd3278b613877c56a93698930342deb46f2dece6fcc |
rhevm-guest-agent-debuginfo-1.0.7-11.el6ev.i686.rpm | SHA-256: 83cd8c774b503c47bf62d36379c9f2fc865c61b1f91e9312d73bda7eeb1c3fe1 |
rhevm-guest-agent-gdm-plugin-1.0.7-11.el6ev.i686.rpm | SHA-256: 46d7a6cc44c56be9b630fc0083d11a58d8f2433344850bfbf1b55950fe25d045 |
rhevm-guest-agent-kdm-plugin-1.0.7-11.el6ev.i686.rpm | SHA-256: 903d49a2d95d293105d77694c2d6b4d41884a9ebe1bbf38134be247f4ebcad8c |
rhevm-guest-agent-pam-module-1.0.7-11.el6ev.i686.rpm | SHA-256: 4d71fec192a51ac998033452aee1e56b6ca2c2a7f2de25d72d639dfe6d830d94 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
rhevm-guest-agent-1.0.7-11.el6ev.src.rpm | SHA-256: ad11f6552e1e5c0eb221256015b10e355282a69c6f173515172c07d9e84d6c15 |
x86_64 | |
rhevm-guest-agent-common-1.0.7-11.el6ev.noarch.rpm | SHA-256: 02860e2f693a4b8bb9d6cbd3278b613877c56a93698930342deb46f2dece6fcc |
rhevm-guest-agent-gdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 61539e0941470c9503a1acb4467a4e626acf83399482f2a2643a3d59334eaef2 |
rhevm-guest-agent-kdm-plugin-1.0.7-11.el6ev.x86_64.rpm | SHA-256: 494c4dcb792c09c054c6dd4efe8cba104960e82bbeaf3fc6e8bab84b467553f8 |
rhevm-guest-agent-pam-module-1.0.7-11.el6ev.x86_64.rpm | SHA-256: c3ad9406a2843606a52e9e09f443e789e1fd80ba13c72a0daf2e2bd428eb99b1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.