Skip to navigation

Bug Fix Advisory virt-v2v bug fix update

Advisory: RHBA-2012:1468-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-11-16
Last updated on: 2012-11-16
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated virt-v2v packages that fix a bug are now available for Red Hat
Enterprise Linux 6.

The virt-v2v packages provide a tool for converting virtual machines to use the
KVM (Kernel-based Virtual Machine) hypervisor or Red Hat Enterprise
Virtualization. The tool modifies both the virtual machine image and its
associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO
drivers if possible.

This update fixes this following bug:

* Previously, when the virt-v2v utility was used to convert a virtual machine
(VM) from a foreign hypervisor (such as Xen or VMware) to Red Hat Enterprise
Virtualization, it set the vm_snapshot_id identifier of all disks of that VM
incorrectly. Consequently, various problems occurred while doing a large number
of tasks on this VM from the side of Red Hat Enterprise Virtualization. With
this update, a unique identifier is generated for each disk in the described
scenario, thus preventing this bug. (BZ#872496)

Users of virt-v2v are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
virt-v2v-0.8.7-7.el6_3.src.rpm
File outdated by:  RHBA-2013:1749
    MD5: 3d6d8c660566f53df879f8ce8ee45aec
SHA-256: ef061f37ecde33e85d3a07aa11f3f4c9d4e87bb2cbeca812c70048acc1158a9a
 
x86_64:
virt-v2v-0.8.7-7.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1749
    MD5: 97d5c32453353ebb1104656331090c40
SHA-256: f16ae53f55f69d53fe5b3705d9e622f24ed56794e754170bd9178a0fd767005a
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
virt-v2v-0.8.7-7.el6_3.src.rpm
File outdated by:  RHBA-2013:1749
    MD5: 3d6d8c660566f53df879f8ce8ee45aec
SHA-256: ef061f37ecde33e85d3a07aa11f3f4c9d4e87bb2cbeca812c70048acc1158a9a
 
x86_64:
virt-v2v-0.8.7-7.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1749
    MD5: 97d5c32453353ebb1104656331090c40
SHA-256: f16ae53f55f69d53fe5b3705d9e622f24ed56794e754170bd9178a0fd767005a
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
virt-v2v-0.8.7-7.el6_3.src.rpm
File outdated by:  RHBA-2013:1749
    MD5: 3d6d8c660566f53df879f8ce8ee45aec
SHA-256: ef061f37ecde33e85d3a07aa11f3f4c9d4e87bb2cbeca812c70048acc1158a9a
 
x86_64:
virt-v2v-0.8.7-7.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1749
    MD5: 97d5c32453353ebb1104656331090c40
SHA-256: f16ae53f55f69d53fe5b3705d9e622f24ed56794e754170bd9178a0fd767005a
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
virt-v2v-0.8.7-7.el6_3.src.rpm
File outdated by:  RHBA-2013:1749
    MD5: 3d6d8c660566f53df879f8ce8ee45aec
SHA-256: ef061f37ecde33e85d3a07aa11f3f4c9d4e87bb2cbeca812c70048acc1158a9a
 
x86_64:
virt-v2v-0.8.7-7.el6_3.x86_64.rpm     MD5: 97d5c32453353ebb1104656331090c40
SHA-256: f16ae53f55f69d53fe5b3705d9e622f24ed56794e754170bd9178a0fd767005a
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
virt-v2v-0.8.7-7.el6_3.src.rpm
File outdated by:  RHBA-2013:1749
    MD5: 3d6d8c660566f53df879f8ce8ee45aec
SHA-256: ef061f37ecde33e85d3a07aa11f3f4c9d4e87bb2cbeca812c70048acc1158a9a
 
x86_64:
virt-v2v-0.8.7-7.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1749
    MD5: 97d5c32453353ebb1104656331090c40
SHA-256: f16ae53f55f69d53fe5b3705d9e622f24ed56794e754170bd9178a0fd767005a
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/