- Issued:
- 2013-11-20
- Updated:
- 2013-11-20
RHBA-2013:1735 - Bug Fix Advisory
Synopsis
rhel-guest-image bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rhel-guest-image packages that fix several bugs and add one enhancement
are now available for Red Hat Enterprise Linux 6.
Description
The rhel-quest-image packages provide a Red Hat Enterprise Linux 6.5 KVM Guest Image for cloud instances. This image is provided as a minimally configured system image which is available for use as-is or for configuration and customization as required by end users.
This update fixes the following bugs:
- Prior to this update, the /etc/ssh/sshd_config file was not created properly due to a missing End of Line (EOL) return. Consequently, the sshd daemon start failed with an error message. The writing of the sequence to /etc/ssh/sshd_config has been corrected, and sshd start no longer fails in this scenario. (BZ#912475, BZ#952280)
- Previously, the persistent udev rule was not removed from the guest image when the virtual machine (VM) was shut down. Consequently, when the VM was booted again and a different network card media access control (MAC) address was assigned to it, the udev rule caused the Network Interface Controller (NIC) to be set as eth1 instead of eth0. This incorrect configuration caused the instance to boot with no network support. This update adds the /etc/udev/rules.d/75-persistent-net-generator.rules file, and the VM configuration works as expected in the described scenario. (BZ#912801)
- The Red Hat Enterprise Linux guest image did not make use of the ttyS0 serial port by default, so tools that monitor the serial console log did not capture any information. This update adds a console log feature to the boot loader, and the Red Hat Enterprise Linux guest image now prints boot messages on the ttyS0 serial port and the standard console. (BZ#969487)
- Metadata access is handled by the network node, and the cloud-init service uses the metadata at startup time. Previously, the cloud-init service did not have the "NOZEROCONF=yes" stanza configured. Consequently, access to the subnet 169.254.0.0/16 range was not routed to the network node, so the cloud-init service failed to work. This update adds "NOZEROCONF=yes" to cloud images in the /etc/sysconfig/network file. Users should avoid turning on the zeroconf route in these images. To disable the zeroconf route at system boot time, edit the /etc/sysconfig/network file as root and add "NOZEROCONF=yes" to a new line at the end of the file. (BZ#983611)
- Previously, the /etc/fstab file contained unnecessary entries. Consequently, file systems mounting did not work properly when updating the kernel and grub installation. With this update, the unnecessary entries have been removed and file systems mounting now works as expected in this scenario. (BZ#1006883)
- Previously, a dhclient configuration option was missing in the ifcfg-eth0 configuration file. As a consequence, the network connectivity was lost if Dynamic Host Configuration Protocol (DHCP) failed. This update adds the “PERSISTENT_DHCLIENT=1” configuration option to the ifcfg-eth0 configuration file. Now, if the Network Interface Controller (NIC) is unable to negotiate a DHCP address, it retries. (BZ#1011013)
In addition, this update adds the following enhancement:
- The virtual-guest image now includes a profile for the "tuned" daemon that is activated by default. This helps improve performance of the guest in most situations. (BZ#974554)
Users of rhel-guest-image are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
- BZ - 912475 - SSHD fails to start after nova reboot $instanceid with "Bad configuration option: restorecon"
- BZ - 969487 - the openstack cloud image should print boot messages also on ttyS0
- BZ - 970820 - Update cloud-init on cloud image to support config disk
- BZ - 974554 - RFE: set virtual-guest tuned profile by default
- BZ - 983611 - Cloud guest images needs to have "NOZEROCONF=yes" in /etc/sysconfig/network
- BZ - 1006883 - wrong /etc/fstab entries
- BZ - 1011013 - add PERSISTENT_DHCLIENT=1 to ifcfg-eth0
- BZ - 1012384 - Missing some packages for nfs/rhn/acpi/selinux functions
- BZ - 1028889 - wrong version in /etc/redhat-release
- BZ - 1030847 - packages under rhel-guest-image have not signed
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
rhel-guest-image-6.5-20131115.0.el6.src.rpm | SHA-256: 84dbe19a53b69461a505a2483fb89fd2e0fb715e9bfa6988b80354099ecea712 |
x86_64 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
i386 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
rhel-guest-image-6.5-20131115.0.el6.src.rpm | SHA-256: 84dbe19a53b69461a505a2483fb89fd2e0fb715e9bfa6988b80354099ecea712 |
x86_64 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
i386 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
rhel-guest-image-6.5-20131115.0.el6.src.rpm | SHA-256: 84dbe19a53b69461a505a2483fb89fd2e0fb715e9bfa6988b80354099ecea712 |
x86_64 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
i386 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
rhel-guest-image-6.5-20131115.0.el6.src.rpm | SHA-256: 84dbe19a53b69461a505a2483fb89fd2e0fb715e9bfa6988b80354099ecea712 |
s390x | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
rhel-guest-image-6.5-20131115.0.el6.src.rpm | SHA-256: 84dbe19a53b69461a505a2483fb89fd2e0fb715e9bfa6988b80354099ecea712 |
ppc64 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
rhel-guest-image-6.5-20131115.0.el6.src.rpm | SHA-256: 84dbe19a53b69461a505a2483fb89fd2e0fb715e9bfa6988b80354099ecea712 |
s390x | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
rhel-guest-image-6.5-20131115.0.el6.src.rpm | SHA-256: 84dbe19a53b69461a505a2483fb89fd2e0fb715e9bfa6988b80354099ecea712 |
x86_64 | |
rhel-guest-image-6-6.5-20131115.0.el6.noarch.rpm | SHA-256: e005e1ae0e205517bbeaebfa9b2154feab83af20cd5d0250d0c4c1b058c88dd1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.