- Issued:
- 2018-06-27
- Updated:
- 2018-06-27
RHEA-2018:2076 - Product Enhancement Advisory
Synopsis
ovirt-host enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-host packages that add various enhancements are now available.
Description
The ovirt-host package consolidates host package requirements into a single meta package.
Changes to the ovirt-host component:
- The cockpit-machines-ovirt plugin (https://cockpit-project.org/guide/latest/feature-ovirtvirtualmachines) has been added to Red Hat Enterprise Linux hosts and Red Hat Virtualization Hosts. (BZ#1579210)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1579210 - [downstream clone - 4.2.4] add cockpit-machines-ovirt to RHVH hosts
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
ovirt-host-4.2.3-1.el7ev.src.rpm | SHA-256: c63a83b31bda888039121e0a1bba4636420febe8d1cb08a5a86811f4ce2fbdc5 |
x86_64 | |
ovirt-host-4.2.3-1.el7ev.x86_64.rpm | SHA-256: 86a2bf44c5208e56185e0986a060a8adf69db0b1b2c57105c827f155772d5815 |
ovirt-host-dependencies-4.2.3-1.el7ev.x86_64.rpm | SHA-256: 52d99d588040c308d599794fbe2a01fb6f05fdf36a0e7049958e121ac5834aff |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
ovirt-host-4.2.3-1.el7ev.src.rpm | SHA-256: c63a83b31bda888039121e0a1bba4636420febe8d1cb08a5a86811f4ce2fbdc5 |
ppc64le | |
ovirt-host-4.2.3-1.el7ev.ppc64le.rpm | SHA-256: 6c6ea0f32e8e101a199c2e9c5bf029cefbaa4f83954fb9d939d5249def941786 |
ovirt-host-dependencies-4.2.3-1.el7ev.ppc64le.rpm | SHA-256: 11c27f2001dc44d0bdcfd066ab69a23d0015983b8fe46d8f71f0d90bf2539ab0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.