- Issued:
- 2013-02-21
- Updated:
- 2013-02-21
RHBA-2013:0546 - Bug Fix Advisory
Synopsis
Important: qemu-kvm-rhev bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated qemu-kvm-rhev packages that fix one bugs are now available.
Description
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the
user-space component for running virtual machines using KVM.
This update fixes the following bug:
- Previously, a guest using the e1000 network adapter could do
auto-negotiation during a system reset when the link_down flag was set.
Consequently, after the reset, the guest network was unavailable. A patch
has been provided to address this bug and the guest can now connect to the
network after a system reset in the described scenario. (BZ#908645)
All users of qemu-kvm-rhev are advised to upgrade to these updated
packages, which fix this bug. After installing this update, shut down
all running virtual machines. Once all virtual machines have shut down,
start them again for this update to take effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 908645 - [RHEV] Patch "e1000: no need auto-negotiation if link was down" may break e1000 guest
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
qemu-kvm-rhev-0.12.1.2-2.355.el6_4.1.src.rpm | SHA-256: 2ff927097835dda422a594249131a1ef11d7c1c46b5e1757e3faac68aeb55f09 |
x86_64 | |
qemu-img-rhev-0.12.1.2-2.355.el6_4.1.x86_64.rpm | SHA-256: 3bf60fb3ea8b05595ddda961d175efcc9751c557d68f42187c7b4f857bd6fc17 |
qemu-kvm-rhev-0.12.1.2-2.355.el6_4.1.x86_64.rpm | SHA-256: 156d0b7fab60d912edacc86cfe70d5ad515ea7f9e06d3b5ed05bea6bb0f561c4 |
qemu-kvm-rhev-debuginfo-0.12.1.2-2.355.el6_4.1.x86_64.rpm | SHA-256: 799a183df747992cc24b8a318656da48324db394c5c26687825d47fd223e2b46 |
qemu-kvm-rhev-tools-0.12.1.2-2.355.el6_4.1.x86_64.rpm | SHA-256: d905b1001239489ff64d91aa8dbc125cb48fb6bb3fbf3c0327006398e8ef3da3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.