- Issued:
- 2019-12-12
- Updated:
- 2019-12-12
RHBA-2019:4231 - Bug Fix Advisory
Synopsis
Red Hat Virtualization Host (redhat-virtualization-host) 4.3.7
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, redhat-virtualization-host, and ovirt-node-ng. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Changes to the ovirt-node-ng component:
- When performing a rollback to the previous RHVH layer, the rollback failed, and the current layer remained.
In this release, rollback to a previous layer succeeds. (BZ#1764534)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization Host 4 for RHEL 7 x86_64
Fixes
- BZ - 1747410 - imgbased upgrade fails: Exception! mount: special device /dev/rhvh_name/rhvh-4.3.5.3-0.20190805.0+1 does not exist
- BZ - 1764534 - TypeError: unicode argument expected, got 'str'
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
imgbased-1.1.13-0.1.el7ev.src.rpm | SHA-256: 50d4ef51799262cf1c4e80cad6a1fd73c75185e599db01706ad54693d1e9ed44 |
ovirt-node-ng-4.3.7-0.20191031.0.el7ev.src.rpm | SHA-256: 763ace0c3bf4f833286ae92c24842ede40a902a48372016d0d63b4610e601c24 |
redhat-release-virtualization-host-4.3.7-0.el7ev.src.rpm | SHA-256: 15e9d005ad7c619d224fa4e774bde0cb11ce8adeaafd58a89855a01942bab11b |
redhat-virtualization-host-4.3.7-20191128.0.el7_7.src.rpm | SHA-256: f016126fab7048f440a721f79536b80e794efbd3e0cd52f4adce4c5c462b4581 |
x86_64 | |
imgbased-1.1.13-0.1.el7ev.noarch.rpm | SHA-256: 33f14dbe497e5b9680eaa1e4c3540cc30236f2c7ae8830e56beb7ee97ac27eaa |
ovirt-node-ng-nodectl-4.3.7-0.20191031.0.el7ev.noarch.rpm | SHA-256: b66c159e30edca734859ab5dde17507eb9ab7acb98a2bc12cd2f51706b24f65e |
python-imgbased-1.1.13-0.1.el7ev.noarch.rpm | SHA-256: 5cdf240ab3991ef9b1e0e54d23cf6885a053fc4d5b2e53c7d5765c0171dc283a |
python2-ovirt-node-ng-nodectl-4.3.7-0.20191031.0.el7ev.noarch.rpm | SHA-256: 097c10702046289ef73da055b7d0906e3721c100e0cb6596a1df3f678bbfae04 |
redhat-release-virtualization-host-4.3.7-0.el7ev.x86_64.rpm | SHA-256: b3ea65b64c850f0fd9f94eecc351ddc4387d25837f21d8b4c92ff4dc781c035d |
redhat-virtualization-host-image-update-4.3.7-20191128.0.el7_7.noarch.rpm | SHA-256: ecd176068fc6504cde4a3ed424284e047bfad2add55529c0e73f9cf69e332eab |
redhat-virtualization-host-image-update-placeholder-4.3.7-0.el7ev.noarch.rpm | SHA-256: afe5ff477afd2825f2c39eb2b099dcff93d3a60e4f4669eb618e50de494446bd |
Red Hat Virtualization Host 4 for RHEL 7
SRPM | |
---|---|
redhat-virtualization-host-4.3.7-20191128.0.el7_7.src.rpm | SHA-256: f016126fab7048f440a721f79536b80e794efbd3e0cd52f4adce4c5c462b4581 |
x86_64 | |
redhat-virtualization-host-image-update-4.3.7-20191128.0.el7_7.noarch.rpm | SHA-256: ecd176068fc6504cde4a3ed424284e047bfad2add55529c0e73f9cf69e332eab |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.