- Issued:
- 2017-10-16
- Updated:
- 2017-10-16
RHBA-2017:2891 - Bug Fix Advisory
Synopsis
qemu-kvm-rhev bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated qemu-kvm-rhev packages that fix several bugs are now available for Red Hat Virtualization Hypervisor 7.
Description
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages provide the user-space component for running virtual machines using KVM.
This update fixes the following bugs:
- Previously, the qemu-kvm service in some cases terminated unexpectedly when starting the Input/Output Memory Management Unit (IOMMU) feature. This update ensures that all active conections are released in the proper order when starting IOMMU. As a result, the back end no longer attempts to handle requests after the connections are released, which prevents the problem from occurring. (BZ#1480446)
- Prior to this update, sending the BREAK or PAUSE keys over the VNC or SPICE client was not properly handled and had no effect in the guest. This update adds proper key handlers for these keys, so they trigger appropriate events in the guest. In addition, sending keys for controlling guest audio over VNC or SPICE now works as expected. (BZ#1482388, BZ#1482389)
- Hot-unplugging Virtual Function I/O (VFIO) devices previously failed when performed after hot-unplugging a vhost network device. This update fixes the underlying code, and the VFIO device is unplugged correctly in the described circumstances. (BZ#1490742)
Users of qemu-kvm are advised to upgrade to these updated packages, which fix these bugs. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
- Red Hat Virtualization for IBM Power LE 3 ppc64le
Fixes
- BZ - 1480446 - vhost-user/iommu: crash when backend disconnects [rhel-7.4.z]
- BZ - 1482388 - Keys to control audio are not forwarded to the guest [rhel-7.4.z]
- BZ - 1482389 - Unable to send PAUSE/BREAK to guests in VNC or SPICE [rhel-7.4.z]
- BZ - 1490742 - Hot-unplugging a vhost network device leaks references to VFIOPCIDevice's [rhel-7.4.z]
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm | SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10 |
x86_64 | |
qemu-img-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: 5c63c3736a5c46705d91c6a14cd4401d79606fc8a6944fd51dc703a818cca20c |
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: 4cec0ace466f0ad6085c487692357e076129fa754cd881691e302712a2be15f1 |
qemu-kvm-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: 3cfc6640e03802ec0c2438fae6f18ab10c032c3ce93a69c5e540a4b06f5c9d99 |
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: b02f078bbba084b11acbe77ba8fad3c7c5c0c7c071e337ac63c1088724e97255 |
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: c91f1614e8ada9c0cbb132d188175874c52bb29046c8534f1c6272bdc2b5aadb |
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm | SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10 |
x86_64 | |
qemu-img-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: 5c63c3736a5c46705d91c6a14cd4401d79606fc8a6944fd51dc703a818cca20c |
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: 4cec0ace466f0ad6085c487692357e076129fa754cd881691e302712a2be15f1 |
qemu-kvm-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: 3cfc6640e03802ec0c2438fae6f18ab10c032c3ce93a69c5e540a4b06f5c9d99 |
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: b02f078bbba084b11acbe77ba8fad3c7c5c0c7c071e337ac63c1088724e97255 |
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.x86_64.rpm | SHA-256: c91f1614e8ada9c0cbb132d188175874c52bb29046c8534f1c6272bdc2b5aadb |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm | SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10 |
ppc64le | |
qemu-img-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: f5f59c486698f542834d09c7306337f5e60a4d8dc487c264659aa4b5c48b3f28 |
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 02abc0707b8806a5f16a5c5ca57d8d2f5389d1165aa7dba20fdb48690d0c1774 |
qemu-kvm-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 4ac5784c31c13a1493917363647a130654819bc6c2f68e52d63e3453fb41c259 |
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 9f97b67ad1d43aaaa1934f97d64fe21d042003717cfe9b2e30413ec8d9a55b04 |
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 7c9c28050128f422027d7310faed691d571b26e9579edc443a63ee00968da786 |
Red Hat Virtualization for IBM Power LE 3
SRPM | |
---|---|
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm | SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10 |
ppc64le | |
qemu-img-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: f5f59c486698f542834d09c7306337f5e60a4d8dc487c264659aa4b5c48b3f28 |
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 02abc0707b8806a5f16a5c5ca57d8d2f5389d1165aa7dba20fdb48690d0c1774 |
qemu-kvm-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 4ac5784c31c13a1493917363647a130654819bc6c2f68e52d63e3453fb41c259 |
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 9f97b67ad1d43aaaa1934f97d64fe21d042003717cfe9b2e30413ec8d9a55b04 |
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.ppc64le.rpm | SHA-256: 7c9c28050128f422027d7310faed691d571b26e9579edc443a63ee00968da786 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.