Skip to navigation

Bug Fix Advisory virt-manager bug fix update

Advisory: RHBA-2011:0077-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-01-13
Last updated on: 2011-01-13
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)

Details

An updated virt-manager package that fixes two bugs and adds an enhancement is
now available for Red Hat Enterprise Linux 5.

Virtual Machine Manager (virt-manager) is a graphical tool for administering
virtual machines for KVM, Xen, and QEMU. virt-manager can start, stop, add or
remove virtualized devices, connect to a graphical or serial console, and see
resource usage statistics for existing virtualized guests on local or remote
machines. It uses the libvirt API.

This update fixes the following bugs:

* Due to various errors in some of the translations, users of Virtual Machine
Manager in non-English languages may have encountered superfluous characters or
even untranslated strings. These errors have been fixed, and the application is
now correctly translated to all available languages. (BZ#513324)

* Since version 5.4, KVM (Kernel-based Virtual Machine) supports memory
overcommitment, which allows virtualized guests to use more than 100% of the
memory that is currently available on a host system. However, when this feature
was in use, Virtual Machine Manager did not display the total memory usage
correctly. With this update, the underlying source code has been adjusted to
check whether the memory is overcommitted, so that the "Memory Usage" field
reports the correct value. (BZ#521754)

As well, this update adds the following enhancement:

* URL installation options for fully virtualized guests have been enabled in
Virtual Machine Manager. This is accomplished by fetching a boot.iso disc image
from the URL install tree. (BZ#612676)

All users of virt-manager are advised to upgrade to this updated package, which
resolves these issues, and adds this enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
virt-manager-0.6.1-13.el5.src.rpm
File outdated by:  RHBA-2012:0216
    MD5: 344fa3acd16c5aea5b0c5a81065d9356
SHA-256: a583f81020401c84d22d64c8d027a3ec62b627b618b06fd73a43d07ae24abbfa
 
IA-32:
virt-manager-0.6.1-13.el5.i386.rpm
File outdated by:  RHBA-2012:0216
    MD5: 90b24419c6d1eee49f5f918e3001679a
SHA-256: 67a230b7890d78613196cbc48f59b5766155a282191bc3fd5d2b7a37a5067ec4
 
x86_64:
virt-manager-0.6.1-13.el5.x86_64.rpm
File outdated by:  RHBA-2012:0216
    MD5: 16545aa2a4d6727159dc795a3feda9e7
SHA-256: 3cdeeeb91e0e15d79e1ceb9599c1dbb580004db1454dcbe5eaa49ca1f1d20607
 
RHEL Virtualization (v. 5 server)

SRPMS:
virt-manager-0.6.1-13.el5.src.rpm
File outdated by:  RHBA-2012:0216
    MD5: 344fa3acd16c5aea5b0c5a81065d9356
SHA-256: a583f81020401c84d22d64c8d027a3ec62b627b618b06fd73a43d07ae24abbfa
 
IA-32:
virt-manager-0.6.1-13.el5.i386.rpm
File outdated by:  RHBA-2012:0216
    MD5: 90b24419c6d1eee49f5f918e3001679a
SHA-256: 67a230b7890d78613196cbc48f59b5766155a282191bc3fd5d2b7a37a5067ec4
 
IA-64:
virt-manager-0.6.1-13.el5.ia64.rpm
File outdated by:  RHBA-2012:0216
    MD5: 0b3522f58a3e938cd4f62ca525c5235a
SHA-256: 7b5f6c8c46fce2edf7b12fe7a7b2fabdd5520a6a84dc1811970e9c73efc62e3a
 
x86_64:
virt-manager-0.6.1-13.el5.x86_64.rpm
File outdated by:  RHBA-2012:0216
    MD5: 16545aa2a4d6727159dc795a3feda9e7
SHA-256: 3cdeeeb91e0e15d79e1ceb9599c1dbb580004db1454dcbe5eaa49ca1f1d20607
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

513324 - virt-manager: Some translations are insufficient
521754 - virt-manager incorrectly displays overcommitted memory
612676 - virt-manager: advertise CDROM URL installs



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/