Red Hat Enterprise Virtualization Manager 3.4.5 is now available.

The Red Hat Enterprise Virtualization Manager is a centralized managementplatform that allows system administrators to view and manage virtual machines.The Manager provides a comprehensive range of features including searchcapabilities, resource management, live migrations, and virtual infrastructureprovisioning.The Manager is a JBoss Application Server application that provides severalinterfaces through which the virtual environment can be accessed and interactedwith, including an Administration Portal, a User Portal, and a RepresentationalState Transfer (REST) Application Programming Interface (API).Users of the Red Hat Enterprise Virtualization Manager are advised to upgrade tothese updated packages.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Virtualization 3.4

SRPMS:
rhevm-3.4.5-0.3.el6ev.src.rpm
    MD5: 6b5b48596524a9becc4601b84057fc7cSHA-256: d80251ee0f989ca03cf622fe0f8daccb5a80061aa999f49d237f83bdba47f1d3
 
x86_64:
rhevm-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 854bf3072b8029711977a36915942d5bSHA-256: 14314eb4552729c4905d24e5642b6b8014bb17de21dd8b7c5878eb1edf989975
rhevm-backend-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 694d9c7b6214e025f9eed041860d7061SHA-256: 002a5e5f9b36c6d1018fa7192b1cc1f56a2797414b39383be8c646c169f5ed88
rhevm-dbscripts-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 0321db71532976b750f441069d8f234eSHA-256: 6d923af7fb3dbacf375894ff46368aec650cf95f49a9ce666a3ad6b6b399d701
rhevm-lib-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 79fb2544f4cd3cf8dbb538fbf7911461SHA-256: a16c30d10d2478fc6bbc1dec65906b95aed6456e4f6d080d56ba75edf64fd4cc
rhevm-restapi-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 4bf9032c880ac085fc1da117195160deSHA-256: b9e1348976ee817d6045cfd6dcae8fa29a325d02aa1e942cb3544dac7e983a60
rhevm-setup-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 8832929450c62f871e74ac452f0843cfSHA-256: 9cb7a6fab2ccc58499ec3c7041ff2ac9adc47d7d99304e6af33dfe9307076ebc
rhevm-setup-base-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 3228eb3a9e933ef519e12264cfc0f5baSHA-256: 8165d28195a7cbf38a92a84d51fd972d1f13677d95adfe51199b95896c7cae28
rhevm-setup-plugin-allinone-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 0e2a01e9e044682ae3b3816b001de645SHA-256: 1b62f8634a9b13a80632358c2e8121188535283ed25d260f5f2f3a5e589576f4
rhevm-setup-plugin-ovirt-engine-3.4.5-0.3.el6ev.noarch.rpm
    MD5: c8a1b7a2fa55fcab4adfa75e23273908SHA-256: 85f7b249557da1b1f3bd04cea8d8c11a05494e7d047da9c904ecb7a5c05b79e0
rhevm-setup-plugin-ovirt-engine-common-3.4.5-0.3.el6ev.noarch.rpm
    MD5: d7d5ccfedfed0b37d263dfd3dab70b27SHA-256: 4fecc6a07803e2a0f204ad4d216236e682cd181d026867b1d6501c5471b2c1c0
rhevm-setup-plugin-websocket-proxy-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 269a01f1f57071aaf58151349bbc3b1fSHA-256: 7a5fac51eb3c1bfad3ca83460e5fe0711425ecae43f9e090d1bd8e470c3409e0
rhevm-tools-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 52534819b1af91b29d5128f77fe76e6eSHA-256: d6bf9999db90e333cecdfa12cc330f113287c9a920c544f09f7ba74d995aa32c
rhevm-userportal-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 4caf13c85bf908839842457f802a498eSHA-256: 2d305cdc7c88539037b49bfc51a9ab3d2d023a679dfbccff0dfe7945da80d427
rhevm-webadmin-portal-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 5fe54c0fe46ef3d48779659cc9d9eeb3SHA-256: 22f92efb454fadbf53b35ba3026aef3d67c4eb6f2958f677880777f5c77c7ff3
rhevm-websocket-proxy-3.4.5-0.3.el6ev.noarch.rpm
    MD5: 785433dd70b8e42219a5ee3f997a791bSHA-256: 07b5071d18b8917860f4261fd055470799fddb717335761f15887478c953683a
 
(The unlinked packages above are only available from the Red Hat Network)
1147396 – Affinity groups fails maintenancing a host1151053 – [RFE][osinfo] add rhel7/ppc64 into osinfo1154184 – RHEV should not use SSLv3 encryption. Use TLS instead1169352 – rhel 7 / rhev 3.4 host can not connect to iscsi storage with: ValueError: invalid literal for int() with base 10: ”

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply