- Issued:
- 2019-06-20
- Updated:
- 2019-06-20
RHBA-2019:1557 - Bug Fix Advisory
Synopsis
ovirt-provider-ovn bug fix and enhancement update for RHV 4.3.4
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
ovirt-provider-ovn bug fix and enhancement update for RHV 4.3.4
Description
The ovirt-provider-ovn package provides support for OVN (Open Virtual Network). It can be installed and configured automatically during engine-setup.
Changes to the ovirt-provider-ovn component:
- after_get_caps is a vdsm hook that periodically checks for a database connection. This hook requires ovs-vswitchd to be running in order to execute properly. Previously, the hook ran even when ovs-vswitchd was disabled, causing an error to be logged to /var/log/messages, eventually flooding it. Now, when the hook starts, it checks if the OVS service is available, and bails out of the hook when the service is not available, so the log is no longer flooded with these error messages. (BZ#1685034)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization Manager 4.3 x86_64
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1685034 - "after_get_caps" ovirt-provider-ovn-driver hook query floods /var/log/messages when ovs-vswitchd is disabled
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization Manager 4.3
SRPM | |
---|---|
ovirt-provider-ovn-1.2.22-1.el7ev.src.rpm | SHA-256: a0a37b38b3b3c419316663db74d386854f5aa831963eddab201887b31cdafd0e |
x86_64 | |
ovirt-provider-ovn-1.2.22-1.el7ev.noarch.rpm | SHA-256: 1574273876c162bec4ead88e6d4783a414d7c3576de69175c0132682a3b2475b |
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
ovirt-provider-ovn-1.2.22-1.el7ev.src.rpm | SHA-256: a0a37b38b3b3c419316663db74d386854f5aa831963eddab201887b31cdafd0e |
x86_64 | |
ovirt-provider-ovn-driver-1.2.22-1.el7ev.noarch.rpm | SHA-256: 52842e8006c66da5355735c543641cbaad641a2ff9b6233e8d2d388e8ec6534f |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
ovirt-provider-ovn-1.2.22-1.el7ev.src.rpm | SHA-256: a0a37b38b3b3c419316663db74d386854f5aa831963eddab201887b31cdafd0e |
ppc64le | |
ovirt-provider-ovn-driver-1.2.22-1.el7ev.noarch.rpm | SHA-256: 52842e8006c66da5355735c543641cbaad641a2ff9b6233e8d2d388e8ec6534f |
ovirt-provider-ovn-driver-1.2.22-1.el7ev.noarch.rpm | SHA-256: 52842e8006c66da5355735c543641cbaad641a2ff9b6233e8d2d388e8ec6534f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.