Updated rhn-virtualization packages that fix one bug are now now available forRed Hat Network Tools.

The rhn-virtualization packages provide several Red Hat Network (RHN) and RHNSatellite actions for manipulating virtual machine guest images. This update fixes the following bug:* The rhn-virtualization-host code did not correctly handle the case where thelibvirtd daemon was installed but not running, causing the root user to receivean email with an error report every two minutes. This update ensures thatrhn-virtualization-host silently exits when appropriate if libvirtd is stopped.(BZ#888871)Users of rhn-virtualization-host who use libvirtd are advised to upgrade tothese updated packages, which fix this bug.
Before applying this update, make sure that all previously-released erratarelevant to your system have been applied.This update is available via Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/kb/docs/DOC-11259Red Hat Network Tools

SRPMS:
rhn-virtualization-5.4.48-4.el5sat.src.rpm
    MD5: 3e67fc51dfeaeee78acff453e0e8aa2aSHA-256: 5948db8689d2eae95f0561b6d448c2bf69f307257bbf333b322bbaa82f7a6da8
rhn-virtualization-5.4.48-4.el6sat.src.rpm
    MD5: b6c846e6f1036a4bd3bca1f86fa6a28bSHA-256: 838a2f79b7a6cb8d4748bd79dc7fce47d8c07dd771fd8b33886b342e4cfcd0f9
 
IA-32:
rhn-virtualization-common-5.4.48-4.el5sat.noarch.rpm
    MD5: be250fb7920e0287bedc2a7013dd2088SHA-256: 0d2769900f58d033cff1549e4e3edb04934eb8e6dfae475325849602fb36f787
rhn-virtualization-common-5.4.48-4.el6sat.noarch.rpm
    MD5: 0cd9f243bfff6ec81d0f720576bf2c98SHA-256: d35c287b31c51ac93ad522d8d18350b68687cf01628cddb0e878c24ef780e98c
rhn-virtualization-host-5.4.48-4.el5sat.noarch.rpm
    MD5: 76e651b6484ef7528dc9150fc89ba090SHA-256: 119a82505de421d7e716ed481bffc4b5772e827fb0a8b0b2493ba4b641f2ef7c
rhn-virtualization-host-5.4.48-4.el6sat.noarch.rpm
    MD5: 42da08941fe91575c8ebacb2bc4a4b6fSHA-256: e33f395e6fdab6f3c9e51a0c4ff7c6607c2b3d9a93b108af58df5bfa095452d9
 
IA-64:
rhn-virtualization-common-5.4.48-4.el5sat.noarch.rpm
    MD5: be250fb7920e0287bedc2a7013dd2088SHA-256: 0d2769900f58d033cff1549e4e3edb04934eb8e6dfae475325849602fb36f787
rhn-virtualization-host-5.4.48-4.el5sat.noarch.rpm
    MD5: 76e651b6484ef7528dc9150fc89ba090SHA-256: 119a82505de421d7e716ed481bffc4b5772e827fb0a8b0b2493ba4b641f2ef7c
 
PPC:
rhn-virtualization-common-5.4.48-4.el5sat.noarch.rpm
    MD5: be250fb7920e0287bedc2a7013dd2088SHA-256: 0d2769900f58d033cff1549e4e3edb04934eb8e6dfae475325849602fb36f787
rhn-virtualization-common-5.4.48-4.el6sat.noarch.rpm
    MD5: 0cd9f243bfff6ec81d0f720576bf2c98SHA-256: d35c287b31c51ac93ad522d8d18350b68687cf01628cddb0e878c24ef780e98c
rhn-virtualization-host-5.4.48-4.el6sat.noarch.rpm
    MD5: 42da08941fe91575c8ebacb2bc4a4b6fSHA-256: e33f395e6fdab6f3c9e51a0c4ff7c6607c2b3d9a93b108af58df5bfa095452d9
 
s390x:
rhn-virtualization-common-5.4.48-4.el5sat.noarch.rpm
    MD5: be250fb7920e0287bedc2a7013dd2088SHA-256: 0d2769900f58d033cff1549e4e3edb04934eb8e6dfae475325849602fb36f787
rhn-virtualization-common-5.4.48-4.el6sat.noarch.rpm
    MD5: 0cd9f243bfff6ec81d0f720576bf2c98SHA-256: d35c287b31c51ac93ad522d8d18350b68687cf01628cddb0e878c24ef780e98c
 
x86_64:
rhn-virtualization-common-5.4.48-4.el5sat.noarch.rpm
    MD5: be250fb7920e0287bedc2a7013dd2088SHA-256: 0d2769900f58d033cff1549e4e3edb04934eb8e6dfae475325849602fb36f787
rhn-virtualization-common-5.4.48-4.el6sat.noarch.rpm
    MD5: 0cd9f243bfff6ec81d0f720576bf2c98SHA-256: d35c287b31c51ac93ad522d8d18350b68687cf01628cddb0e878c24ef780e98c
rhn-virtualization-host-5.4.48-4.el5sat.noarch.rpm
    MD5: 76e651b6484ef7528dc9150fc89ba090SHA-256: 119a82505de421d7e716ed481bffc4b5772e827fb0a8b0b2493ba4b641f2ef7c
rhn-virtualization-host-5.4.48-4.el6sat.noarch.rpm
    MD5: 42da08941fe91575c8ebacb2bc4a4b6fSHA-256: e33f395e6fdab6f3c9e51a0c4ff7c6607c2b3d9a93b108af58df5bfa095452d9
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply