Skip to navigation

Bug Fix Advisory virt-v2v bug fix update

Advisory: RHBA-2013:1749-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-21
Last updated on: 2014-01-16
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.5)
Red Hat Enterprise Linux Server EUS (v. 6.5.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated virt-v2v package that fixes one bug is now available for Red Hat
Enterprise Linux 6.

The virt-v2v package provides a tool for converting virtual machines to use the
KVM (Kernel-based Virtual Machine) hypervisor or Red Hat Enterprise
Virtualization. The tool modifies both the virtual machine image and its
associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO
drivers if possible.

This update fixes the following bug:

* An update to virt-v2v included upstream support for the import of OVA images
exported by VMware servers. Unfortunately, testing has shown that VMDK images
created by recent versions of VMware ESX cannot be reliably supported, thus this
feature has been withdrawn. (BZ#1028983)

Users of virt-v2v are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
virt-v2v-0.9.1-5.el6_5.src.rpm     MD5: 42e0dc52cfb039088d5e03f8b1771f85
SHA-256: 823f067bea61c10e9cc790a19dc5a942e5b77a5d198957e4077a3490a3412318
 
x86_64:
virt-v2v-0.9.1-5.el6_5.x86_64.rpm     MD5: 5d222ab7c1150c70d9b2f3a02b56cac4
SHA-256: 468af034c1a3b451b64add83cbe9897a864dc23d373bf8efaf7c953d99b3ca0a
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
virt-v2v-0.9.1-5.el6_5.src.rpm     MD5: 42e0dc52cfb039088d5e03f8b1771f85
SHA-256: 823f067bea61c10e9cc790a19dc5a942e5b77a5d198957e4077a3490a3412318
 
x86_64:
virt-v2v-0.9.1-5.el6_5.x86_64.rpm     MD5: 5d222ab7c1150c70d9b2f3a02b56cac4
SHA-256: 468af034c1a3b451b64add83cbe9897a864dc23d373bf8efaf7c953d99b3ca0a
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
virt-v2v-0.9.1-5.el6_5.src.rpm     MD5: 42e0dc52cfb039088d5e03f8b1771f85
SHA-256: 823f067bea61c10e9cc790a19dc5a942e5b77a5d198957e4077a3490a3412318
 
x86_64:
virt-v2v-0.9.1-5.el6_5.x86_64.rpm     MD5: 5d222ab7c1150c70d9b2f3a02b56cac4
SHA-256: 468af034c1a3b451b64add83cbe9897a864dc23d373bf8efaf7c953d99b3ca0a
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
virt-v2v-0.9.1-5.el6_5.src.rpm     MD5: 42e0dc52cfb039088d5e03f8b1771f85
SHA-256: 823f067bea61c10e9cc790a19dc5a942e5b77a5d198957e4077a3490a3412318
 
x86_64:
virt-v2v-0.9.1-5.el6_5.x86_64.rpm     MD5: 5d222ab7c1150c70d9b2f3a02b56cac4
SHA-256: 468af034c1a3b451b64add83cbe9897a864dc23d373bf8efaf7c953d99b3ca0a
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
virt-v2v-0.9.1-5.el6_5.src.rpm     MD5: 42e0dc52cfb039088d5e03f8b1771f85
SHA-256: 823f067bea61c10e9cc790a19dc5a942e5b77a5d198957e4077a3490a3412318
 
x86_64:
virt-v2v-0.9.1-5.el6_5.x86_64.rpm     MD5: 5d222ab7c1150c70d9b2f3a02b56cac4
SHA-256: 468af034c1a3b451b64add83cbe9897a864dc23d373bf8efaf7c953d99b3ca0a
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
virt-v2v-0.9.1-5.el6_5.src.rpm     MD5: 42e0dc52cfb039088d5e03f8b1771f85
SHA-256: 823f067bea61c10e9cc790a19dc5a942e5b77a5d198957e4077a3490a3412318
 
x86_64:
virt-v2v-0.9.1-5.el6_5.x86_64.rpm     MD5: 5d222ab7c1150c70d9b2f3a02b56cac4
SHA-256: 468af034c1a3b451b64add83cbe9897a864dc23d373bf8efaf7c953d99b3ca0a
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/