- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1423 - Bug Fix Advisory
Synopsis
kvm bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kvm packages that resolve an issue are now available.
Description
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware.
These updated kvm packages fix the following bug:
- rebooting a KVM guest domain could cause the guest to fail to receive keyboard and mouse input
following the reboot. This has been fixed by reinitializing keyboard and mouse state in the guest
after it reboots, which resolves the issue. (BZ#517855)
Note: after installing these updated packages, the following procedure should be carried out to
ensure that the fix takes effect:
1. Stop all KVM guest virtual machines (VMs).
2. Either reboot the hypervisor machine, or, as the superuser, remove (using "modprobe -r [module]")
and reload (using "modprobe [module]") all of the following modules which are currently running
(determined using "lsmod"): kvm, ksm, kvm-intel or kvm-amd.
3. Restart the KVM guest VMs.
All users of kvm are advised to upgrade to these updated packages, which resolve this issue.
Solution
Before applying this update, make sure that all previously-released errata relevant to your system
have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply
this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Workstation 5 x86_64
Fixes
- BZ - 517855 - guest not accepting keystrokes or mouse clicks after reboot
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kvm-83-105.el5_4.1.src.rpm | SHA-256: 5e70b042d6c724feda25d9c3aa7e08a2a93507648fcf5938105a1f2544e7288b |
x86_64 | |
kmod-kvm-83-105.el5_4.1.x86_64.rpm | SHA-256: abb4a7d7093dcd5a047492a5476bb0ae8c9eb69a6fe644283ad14ee6eae096d1 |
kvm-83-105.el5_4.1.x86_64.rpm | SHA-256: 35ac0d922704a0605598906014f0743633a0664b8a4b810cd03e92f3ca4dced6 |
kvm-qemu-img-83-105.el5_4.1.x86_64.rpm | SHA-256: 413f92aa9148875ba03036068f21d67c2242072ccef1b1dff2aa807e8e14f907 |
kvm-tools-83-105.el5_4.1.x86_64.rpm | SHA-256: 5b0f196692dd21768360edec509a56440f81bdf23ad0ded9d3f28a16cb0fbf13 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kvm-83-105.el5_4.1.src.rpm | SHA-256: 5e70b042d6c724feda25d9c3aa7e08a2a93507648fcf5938105a1f2544e7288b |
x86_64 | |
kmod-kvm-83-105.el5_4.1.x86_64.rpm | SHA-256: abb4a7d7093dcd5a047492a5476bb0ae8c9eb69a6fe644283ad14ee6eae096d1 |
kvm-83-105.el5_4.1.x86_64.rpm | SHA-256: 35ac0d922704a0605598906014f0743633a0664b8a4b810cd03e92f3ca4dced6 |
kvm-qemu-img-83-105.el5_4.1.x86_64.rpm | SHA-256: 413f92aa9148875ba03036068f21d67c2242072ccef1b1dff2aa807e8e14f907 |
kvm-tools-83-105.el5_4.1.x86_64.rpm | SHA-256: 5b0f196692dd21768360edec509a56440f81bdf23ad0ded9d3f28a16cb0fbf13 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.