- Issued:
- 2017-04-18
- Updated:
- 2017-07-17
RHEA-2017:1001 - Product Enhancement Advisory
Synopsis
ovirt-setup-lib bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-setup-lib packages that fix several bugs and add various enhancements are now available.
Description
The ovirt-setup-lib package includes common code for the rhevm and ovirt-hosted-engine-setup packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4.1 x86_64
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1380629 - Build ovirt-setup-lib for RHEL 7 RHV 4.1
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization 4.1
SRPM | |
---|---|
ovirt-setup-lib-1.1.0-1.el7ev.src.rpm | SHA-256: 058c396af8b67721ecbb08d933b8bdd4db0192d4ef0207a2088e674cb890ae5a |
x86_64 | |
ovirt-setup-lib-1.1.0-1.el7ev.noarch.rpm | SHA-256: 3188393c2b56f9f6eb2137a4a2cdd8aa7d60e8068b917cd5c73ac6d49d867ada |
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
ovirt-setup-lib-1.1.0-1.el7ev.src.rpm | SHA-256: 058c396af8b67721ecbb08d933b8bdd4db0192d4ef0207a2088e674cb890ae5a |
x86_64 | |
ovirt-setup-lib-1.1.0-1.el7ev.noarch.rpm | SHA-256: 3188393c2b56f9f6eb2137a4a2cdd8aa7d60e8068b917cd5c73ac6d49d867ada |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
ovirt-setup-lib-1.1.0-1.el7ev.src.rpm | SHA-256: 058c396af8b67721ecbb08d933b8bdd4db0192d4ef0207a2088e674cb890ae5a |
ppc64le | |
ovirt-setup-lib-1.1.0-1.el7ev.noarch.rpm | SHA-256: 3188393c2b56f9f6eb2137a4a2cdd8aa7d60e8068b917cd5c73ac6d49d867ada |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.