- Issued:
- 2015-10-26
- Updated:
- 2015-10-26
RHBA-2015:1935 - Bug Fix Advisory
Synopsis
ovirt-node bug fix and enhancement update for RHEV 3.5.5
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-node packages that fix several bugs and add various enhancements
are now available.
Description
The ovirt-node package provides the utilities and recipes used to create and
configure the Red Hat Enterprise Virtualization Hypervisor ISO image.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for the
Intel 64 and AMD64 architectures with virtualization extensions
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 7 x86_64
- Red Hat Virtualization 6 x86_64
Fixes
- BZ - 1263203 - Enable FCoE by default in RHEV-H
- BZ - 1263211 - node loses public key after reboot
- BZ - 1263213 - [3.5-6.6] Unexpected block devices are listed on "select disk" during dirty TUI installation on machine
- BZ - 1263215 - Fail to unpersist file if not using full path
- BZ - 1266094 - sshd_t denials in audit.log
- BZ - 1266095 - [7.1-3.5.4] avc denied errors (dev="tmpfs") in audit.log
CVEs
(none)
References
(none)
Red Hat Virtualization 7
SRPM | |
---|---|
x86_64 | |
ovirt-node-3.2.3-23.el7.noarch.rpm | SHA-256: 2062c324ef601ecf0759e3456577063420113654f469f79f8ab9d10883e6a9ea |
ovirt-node-branding-rhev-3.2.3-23.el7.noarch.rpm | SHA-256: d0d3f99bd3579704279dd3f3ee47a239e7046c2f24e7f3b465c51150fe51e329 |
ovirt-node-minimizer-3.2.3-23.el7.noarch.rpm | SHA-256: bf93eaeeef7cb6770252eedd8fa53a437f20a84b31c7b09981eff1d6f5a82d88 |
ovirt-node-plugin-cim-3.2.3-23.el7.noarch.rpm | SHA-256: 14026b1038d0e1e8fcc75f5b1a9faabf74538115cec57de4fa7a76d7903cc6b8 |
ovirt-node-plugin-ipmi-3.2.3-23.el7.noarch.rpm | SHA-256: 0e2b4c055e71140721511bdcb9a3d149779c661c9b48b714c6bf9b93630f2e6b |
ovirt-node-plugin-rhn-3.2.3-23.el7.noarch.rpm | SHA-256: dc3a4a05e48ebfc4e56ef46b6684a3e6e3bcd7f86846c39cc49c24895064d3d6 |
ovirt-node-plugin-snmp-3.2.3-23.el7.noarch.rpm | SHA-256: 9eec79fb972d8fa69fe90bd6cd46308b1c5eaae189382dc3ae13506b9b73e0f5 |
ovirt-node-recipe-3.2.3-23.el7.noarch.rpm | SHA-256: ee4a3b89311082be9dc627a693f2685892f3e98b29e3ae923dff68a9ba095352 |
ovirt-node-selinux-3.2.3-23.el7.noarch.rpm | SHA-256: a127423eaf5374b3eda19b7573391b6b47e849acfb4a3ef9a7261efbdde48006 |
ovirt-node-tools-3.2.3-23.el7.noarch.rpm | SHA-256: ad0c0d33f09a3b5aef4085d8c25cb11d9c541c57e118ca2f81642aa7ce1df881 |
Red Hat Virtualization 6
SRPM | |
---|---|
ovirt-node-3.2.3-23.el6.src.rpm | SHA-256: 04630f78140fd56224855556e085e7577bf46d0abac378445c5853981475a0f6 |
x86_64 | |
ovirt-node-3.2.3-23.el6.noarch.rpm | SHA-256: 0ff8bd31bf89b21162d9cddf71977d99a163804116cd55309484f9d483d1f408 |
ovirt-node-branding-rhev-3.2.3-23.el6.noarch.rpm | SHA-256: 09fdb2535e0b55c1c1c272c0a175ac0653c2ea4665448b8ce465fa309c875e8b |
ovirt-node-minimizer-3.2.3-23.el6.noarch.rpm | SHA-256: 864510aa3ab2d73a5dc7820f904e6fb66e5306d0ca1318b55ac6321187954570 |
ovirt-node-plugin-cim-3.2.3-23.el6.noarch.rpm | SHA-256: 4225dbb9dc66960a558b886a71870d78445031ac441ad999e120eb1e5367a38b |
ovirt-node-plugin-ipmi-3.2.3-23.el6.noarch.rpm | SHA-256: 8186aef2749b907ce487a2d7bbf1c6560f0733bb2e440208fb982ad74c58f7c7 |
ovirt-node-plugin-rhn-3.2.3-23.el6.noarch.rpm | SHA-256: f59e3f26714151dc4ad51494f99c9fc2a7eee82425259972e1604cb3b62af77d |
ovirt-node-plugin-snmp-3.2.3-23.el6.noarch.rpm | SHA-256: dc663e7916cee94176c4ecdfe12ecb14c239bad2208c269024931e885392845d |
ovirt-node-recipe-3.2.3-23.el6.noarch.rpm | SHA-256: 32f940ee3260c8a5b533bd25bad549a44a01d8e5c36c1caac213e2bb265df979 |
ovirt-node-selinux-3.2.3-23.el6.noarch.rpm | SHA-256: 63c8721104c293ea6938a4368bba4df1f4791f2dfac84186688b98c7f85d67cf |
ovirt-node-tools-3.2.3-23.el6.noarch.rpm | SHA-256: 08d21055c1a448943af849772c0ca89b01ac6ae79ab3b6f0e18b9c5a016b9f68 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.