Skip to navigation

Bug Fix Advisory kvm bug fix update

Advisory: RHBA-2010:0479-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-06-22
Last updated on: 2010-06-22
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)

Details

Updated kvm packages that address several issues are now available.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for
the standard Red Hat Enterprise Linux kernel. KVM can run multiple
unmodified, virtualized guest Windows and Linux operating systems.

These updated packages fix the following bugs:

* it was found that qemu-img rebase could corrupt output images under
certain conditions, due to clusters being taken from the backing file
rather than the COW file. qemu-image rebase now always gives clusters in
the COW file priority over those in the backing file, resolving this issue.
(BZ#596378)

* for particular workloads, KVM would become stuck in an infinite loop
while updating a guest page table entry (PTE). The qemu process used by
qemu-kvm could not be killed, but continues to consume resources. This
issue has been resolved. (BZ#596381)

* a rare theoretical race condition was found in the pvclock code for
setting the wallclock. An unprotected global variable was used to hold
version data, allowing guests to interfere with one another if they would
both write wallclock data at the same time. The race condition has been
removed, and this issue is now resolved. (BZ#596625)

* an error in a rarely used code path in the refcount table growth code of
qcow2 caused inconsistencies in the metadata, which could lead to real data
corruption later on. The corruption after refblock allocation was fixed,
and this issue is now resolved. (BZ#602363)

* after saving a guest snapshot and restarting it, guests failed to boot
and suffered a kernel panic. This issue only occurred when guests used
virtio block drivers and ran multiple requests at the same time. The qcow2
block driver lacked a synchronous version, which has been added, and the
issue is now resolved. (BZ#604188)

All KVM users should upgrade to these updated packages, which contain
backported patches to resolve these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
kvm-83-164.el5_5.12.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 828435b1b462a0a0a4a0da3da797cf86
SHA-256: c13e09d2beefd21fbf182e06efd21165861ea69a6764d0d5354323e71fa1c7eb
 
x86_64:
kmod-kvm-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: b3d1f4a446d91651f1d3004936439276
SHA-256: 90e1df8db0d793566c4c25c9e7b4afc990f7726966fe886b12fe62f754a78e97
kvm-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 7d4abe7f73dd2756e1eeefb7d3178514
SHA-256: 4939bf9301542b0debd2662fd176f75e710c50259a4b3590c516965763c940d2
kvm-qemu-img-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 28721366c68f031949623d01e55d5ad3
SHA-256: 706dfa391c62eb4604d54150abcc1497c1b126f2fe329a7769929277407dac2d
kvm-tools-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 0186082c9cd6c49191ddfb060ed886f6
SHA-256: 0c8da3e7bdc6e7a1a3077480350b898fb5f40f928a4bff5ef172443467d1af44
 
RHEL Virtualization (v. 5 server)

SRPMS:
kvm-83-164.el5_5.12.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 828435b1b462a0a0a4a0da3da797cf86
SHA-256: c13e09d2beefd21fbf182e06efd21165861ea69a6764d0d5354323e71fa1c7eb
 
x86_64:
kmod-kvm-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: b3d1f4a446d91651f1d3004936439276
SHA-256: 90e1df8db0d793566c4c25c9e7b4afc990f7726966fe886b12fe62f754a78e97
kvm-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 7d4abe7f73dd2756e1eeefb7d3178514
SHA-256: 4939bf9301542b0debd2662fd176f75e710c50259a4b3590c516965763c940d2
kvm-qemu-img-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 28721366c68f031949623d01e55d5ad3
SHA-256: 706dfa391c62eb4604d54150abcc1497c1b126f2fe329a7769929277407dac2d
kvm-tools-83-164.el5_5.12.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 0186082c9cd6c49191ddfb060ed886f6
SHA-256: 0c8da3e7bdc6e7a1a3077480350b898fb5f40f928a4bff5ef172443467d1af44
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

596378 - After re-base snapshot, the file in the snapshot disappeared
596381 - kvm spinning updating a guest pte, unkillable
596625 - race condition in pvclock wallclock calculation
602363 - qcow2 corruption bug in refcount table growth
604188 - Guest suffers kernel panic when save snapshot then restart guest



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/