- Issued:
- 2019-10-10
- Updated:
- 2019-10-10
RHBA-2019:3008 - Bug Fix Advisory
Synopsis
Remove warnings on update of rhv-openvswitch
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
rhv-openvswitch for for RHV 4.3.6
Description
Fix yum related warnings during install / upgrade of rhv-openvswitch.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization Manager 4.3 x86_64
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1734346 - [downstream clone - 4.3.6] warning on update of rhv-openvswitch
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization Manager 4.3
SRPM | |
---|---|
rhv-openvswitch-2.11-5.el7ev.src.rpm | SHA-256: 3c2ec537ea7bb26fca0000d9fd975cddbe789969700318cb8acac57b70971c5f |
x86_64 | |
rhv-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: c5063fd52194abe108f7157baa6731b10b723900a1fe509d6d6e0029862e6a22 |
rhv-openvswitch-devel-2.11-5.el7ev.noarch.rpm | SHA-256: 6fc980e2c0bdbc2781e1aef6826662a852559220d022dc21a465eb8734f9a7c0 |
rhv-openvswitch-ovn-central-2.11-5.el7ev.noarch.rpm | SHA-256: ccb42ba58828d02f5d52f5f4845ed69133be21b462e3db096e87ce242ee1a76b |
rhv-openvswitch-ovn-common-2.11-5.el7ev.noarch.rpm | SHA-256: 97b7fe8b4bab8e016f6bce87bd122896b5dcde0af6aa707925e30a66f1e896f0 |
rhv-python-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: ca0838b39a98a3440a84d0054344ce204490e7876f80a6df73090bbbd3d48416 |
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
rhv-openvswitch-2.11-5.el7ev.src.rpm | SHA-256: 3c2ec537ea7bb26fca0000d9fd975cddbe789969700318cb8acac57b70971c5f |
x86_64 | |
rhv-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: c5063fd52194abe108f7157baa6731b10b723900a1fe509d6d6e0029862e6a22 |
rhv-openvswitch-devel-2.11-5.el7ev.noarch.rpm | SHA-256: 6fc980e2c0bdbc2781e1aef6826662a852559220d022dc21a465eb8734f9a7c0 |
rhv-openvswitch-ovn-common-2.11-5.el7ev.noarch.rpm | SHA-256: 97b7fe8b4bab8e016f6bce87bd122896b5dcde0af6aa707925e30a66f1e896f0 |
rhv-openvswitch-ovn-host-2.11-5.el7ev.noarch.rpm | SHA-256: 11487f401c7a5ab41ffb5d6311014458e2436a4a96b48088bc5990d92442c2dd |
rhv-python-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: ca0838b39a98a3440a84d0054344ce204490e7876f80a6df73090bbbd3d48416 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
rhv-openvswitch-2.11-5.el7ev.src.rpm | SHA-256: 3c2ec537ea7bb26fca0000d9fd975cddbe789969700318cb8acac57b70971c5f |
ppc64le | |
rhv-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: c5063fd52194abe108f7157baa6731b10b723900a1fe509d6d6e0029862e6a22 |
rhv-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: c5063fd52194abe108f7157baa6731b10b723900a1fe509d6d6e0029862e6a22 |
rhv-openvswitch-devel-2.11-5.el7ev.noarch.rpm | SHA-256: 6fc980e2c0bdbc2781e1aef6826662a852559220d022dc21a465eb8734f9a7c0 |
rhv-openvswitch-devel-2.11-5.el7ev.noarch.rpm | SHA-256: 6fc980e2c0bdbc2781e1aef6826662a852559220d022dc21a465eb8734f9a7c0 |
rhv-openvswitch-ovn-common-2.11-5.el7ev.noarch.rpm | SHA-256: 97b7fe8b4bab8e016f6bce87bd122896b5dcde0af6aa707925e30a66f1e896f0 |
rhv-openvswitch-ovn-common-2.11-5.el7ev.noarch.rpm | SHA-256: 97b7fe8b4bab8e016f6bce87bd122896b5dcde0af6aa707925e30a66f1e896f0 |
rhv-openvswitch-ovn-host-2.11-5.el7ev.noarch.rpm | SHA-256: 11487f401c7a5ab41ffb5d6311014458e2436a4a96b48088bc5990d92442c2dd |
rhv-openvswitch-ovn-host-2.11-5.el7ev.noarch.rpm | SHA-256: 11487f401c7a5ab41ffb5d6311014458e2436a4a96b48088bc5990d92442c2dd |
rhv-python-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: ca0838b39a98a3440a84d0054344ce204490e7876f80a6df73090bbbd3d48416 |
rhv-python-openvswitch-2.11-5.el7ev.noarch.rpm | SHA-256: ca0838b39a98a3440a84d0054344ce204490e7876f80a6df73090bbbd3d48416 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.