Skip to navigation

Bug Fix Advisory python-virtinst bug fix and enhancement update

Advisory: RHBA-2011:1054-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)

Details

An enhanced python-virtinst package that fixes various bugs and provides an
enhancement is now available for Red Hat Enterprise Linux 5.

The python-virtinst utility is a module that helps build and install
libvirt-based virtual machines.

This updated python-virtinst package includes fixes for the following bugs:

* A missing "boot-on" parameter caused the installation of a Windows guest to
fail due to the reqiured disk device being offline. This problem has been fixed:
the "boot=on" value is now among the command line values and the installation
successfully completes. (BZ#568294)

* Previously, after a qcow2 image was created using the "qemu-img" command, a
virtual machine could not be installed to this image using the "virt-install"
command. The "virt-install" command now supports the qcow2 image.(BZ#644271)

In addition, this updated python-virtinst package provides the following
enhancement:

* There was a typo in the randomMAC method for the Xen utility defined in the
util.py file. The randomly generated MAC addresses incorrectly started with the
prefix 00:16:36. This could have caused some tools depending on the expected MAC
prefix to not work with guests created by the virt-install tool. This has been
fixed and the MAC addresses now correctly start with the prefix 00:16:3E.
(BZ#679949)

All users of python-virtinst are advised to upgrade to this updated package,
which resolves these bugs and provides this enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
python-virtinst-0.400.3-12.el5.src.rpm
File outdated by:  RHBA-2012:0233
    MD5: d5d94df25e94846875fd4b148e3e0a4f
SHA-256: a754cdc404403d02da97890367d11195f19ae92fcc1337da9c8ed5eb1fcd842f
 
IA-32:
python-virtinst-0.400.3-12.el5.noarch.rpm
File outdated by:  RHBA-2012:0233
    MD5: 0964aa5d70a1e51c03d2bbf692b9ddd8
SHA-256: 78a6b9f20b28e966f14c1c1382df1cc9ca515bfdc0c00bf59b0305ad2e7d0e6c
 
x86_64:
python-virtinst-0.400.3-12.el5.noarch.rpm
File outdated by:  RHBA-2012:0233
    MD5: 0964aa5d70a1e51c03d2bbf692b9ddd8
SHA-256: 78a6b9f20b28e966f14c1c1382df1cc9ca515bfdc0c00bf59b0305ad2e7d0e6c
 
RHEL Virtualization (v. 5 server)

SRPMS:
python-virtinst-0.400.3-12.el5.src.rpm
File outdated by:  RHBA-2012:0233
    MD5: d5d94df25e94846875fd4b148e3e0a4f
SHA-256: a754cdc404403d02da97890367d11195f19ae92fcc1337da9c8ed5eb1fcd842f
 
IA-32:
python-virtinst-0.400.3-12.el5.noarch.rpm
File outdated by:  RHBA-2012:0233
    MD5: 0964aa5d70a1e51c03d2bbf692b9ddd8
SHA-256: 78a6b9f20b28e966f14c1c1382df1cc9ca515bfdc0c00bf59b0305ad2e7d0e6c
 
IA-64:
python-virtinst-0.400.3-12.el5.noarch.rpm
File outdated by:  RHBA-2012:0233
    MD5: 0964aa5d70a1e51c03d2bbf692b9ddd8
SHA-256: 78a6b9f20b28e966f14c1c1382df1cc9ca515bfdc0c00bf59b0305ad2e7d0e6c
 
x86_64:
python-virtinst-0.400.3-12.el5.noarch.rpm
File outdated by:  RHBA-2012:0233
    MD5: 0964aa5d70a1e51c03d2bbf692b9ddd8
SHA-256: 78a6b9f20b28e966f14c1c1382df1cc9ca515bfdc0c00bf59b0305ad2e7d0e6c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

568294 - virt-install needs to facilitate windows virtio disk driver installs
644271 - The virt-install doesn't support --format option,so can't install on the qcow2 image
679949 - typo mac in virtinst.util.randomMAC for xen



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/