- Issued:
- 2016-12-20
- Updated:
- 2016-12-20
RHBA-2016:2964 - Bug Fix Advisory
Synopsis
virt-who bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated virt-who package that fixes several bugs is now available for Red Hat Enterprise Linux 7.
Description
The virt-who package provides an agent that collects information about virtual guests present in the system and reports them to the subscription manager.
This update fixes the following bugs:
- Prior to this update, virt-who failed to connect to Red Hat Enterprise Virtualization Manager 4.0, as virt-who did not properly parse the virt-who configuration file. With this update, virt-who reads its configuration as expected, and can successfully connect to Red Hat Enterprise Virtualization Manager 4.0. (BZ#1372187)
- Previously, virt-who was very verbose when writing to its log file. As a result, the log file grew very quickly, especially in large environments. Now, virt-who logs significantly less information in non-debug mode, and the log file thus grows slower. (BZ#1369473)
- Prior to this update, virt-who could not handle error code 429 (Too Many Requests) and stopped its operation when the error occurred. With this update, virt-who delays further communication with the Red Hat Subscription Manager when it receives error 429, but resumes the operation afterwards. (BZ#1368365)
Users of virt-who are advised to upgrade to this updated package, which fixes this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.2 x86_64
- Red Hat Enterprise Linux Server - AUS 7.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.2 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.2 ppc64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 7.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.2 x86_64
Fixes
- BZ - 1368365 - Properly handle http 429 error code
- BZ - 1369473 - running virt-who in big vmware environments results in to fast growing logfiles
- BZ - 1372187 - [RHEVH7-ng-4.0]Virt-who failed to connect rhevm4.0 as "HTTP Error 404"
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.2
SRPM | |
---|---|
virt-who-0.14-9.el7_2.3.src.rpm | SHA-256: 654363a17dc8fd0c46f0277dd04d62273e0ec1fa2222cb2fc71338406adf5ef1 |
x86_64 | |
virt-who-0.14-9.el7_2.3.noarch.rpm | SHA-256: b51cee29c00a63292229f76e07dce9d96b1b5cf2762d41442998f14f986b3684 |
Red Hat Enterprise Linux Server - AUS 7.2
SRPM | |
---|---|
virt-who-0.14-9.el7_2.3.src.rpm | SHA-256: 654363a17dc8fd0c46f0277dd04d62273e0ec1fa2222cb2fc71338406adf5ef1 |
x86_64 | |
virt-who-0.14-9.el7_2.3.noarch.rpm | SHA-256: b51cee29c00a63292229f76e07dce9d96b1b5cf2762d41442998f14f986b3684 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.2
SRPM | |
---|---|
virt-who-0.14-9.el7_2.3.src.rpm | SHA-256: 654363a17dc8fd0c46f0277dd04d62273e0ec1fa2222cb2fc71338406adf5ef1 |
s390x | |
virt-who-0.14-9.el7_2.3.noarch.rpm | SHA-256: b51cee29c00a63292229f76e07dce9d96b1b5cf2762d41442998f14f986b3684 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.2
SRPM | |
---|---|
virt-who-0.14-9.el7_2.3.src.rpm | SHA-256: 654363a17dc8fd0c46f0277dd04d62273e0ec1fa2222cb2fc71338406adf5ef1 |
ppc64 | |
virt-who-0.14-9.el7_2.3.noarch.rpm | SHA-256: b51cee29c00a63292229f76e07dce9d96b1b5cf2762d41442998f14f986b3684 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.2
SRPM | |
---|---|
virt-who-0.14-9.el7_2.3.src.rpm | SHA-256: 654363a17dc8fd0c46f0277dd04d62273e0ec1fa2222cb2fc71338406adf5ef1 |
ppc64le | |
virt-who-0.14-9.el7_2.3.noarch.rpm | SHA-256: b51cee29c00a63292229f76e07dce9d96b1b5cf2762d41442998f14f986b3684 |
Red Hat Enterprise Linux Server - TUS 7.2
SRPM | |
---|---|
virt-who-0.14-9.el7_2.3.src.rpm | SHA-256: 654363a17dc8fd0c46f0277dd04d62273e0ec1fa2222cb2fc71338406adf5ef1 |
x86_64 | |
virt-who-0.14-9.el7_2.3.noarch.rpm | SHA-256: b51cee29c00a63292229f76e07dce9d96b1b5cf2762d41442998f14f986b3684 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.2
SRPM | |
---|---|
virt-who-0.14-9.el7_2.3.src.rpm | SHA-256: 654363a17dc8fd0c46f0277dd04d62273e0ec1fa2222cb2fc71338406adf5ef1 |
x86_64 | |
virt-who-0.14-9.el7_2.3.noarch.rpm | SHA-256: b51cee29c00a63292229f76e07dce9d96b1b5cf2762d41442998f14f986b3684 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.