Skip to navigation

Bug Fix Advisory kvm bug fix update

Advisory: RHBA-2011:1068-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)

Details

Updated kvm packages that fix various bugs are now available for Red Hat
Enterprise Linux 5.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on x86 hardware containing virtualization extensions. It consists of a loadable
kernel module, kvm.ko, that provides the core virtualization infrastructure and
a processor specific module, kvm-intel.ko or kvm-amd.ko.

These updated kvm packages include a number of bug fixes. Space precludes
documenting all of these changes in this advisory. Refer to the Red Hat
Enterprise Linux 5.7 Technical Notes for information about these changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kvm.html#RHBA-2011-1068

All users of kvm are advised to upgrade to these updated packages, which which
provide numerous bug fixes. The system must be rebooted for this update to take
effect.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
kvm-83-239.el5.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 787886220366306f3ecc5160eea111fe
SHA-256: d938d404cb0181f9e7cc9abfd6d4662d9d79c5ac002bd05d39fcfb41e4d38543
 
x86_64:
kmod-kvm-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 5b75d6125a205b1dcc6a5028023266f7
SHA-256: 11abf568cbf070accaa2b83a8a4ee4896ecbd31eece16ce9bd5987be0ff489f4
kmod-kvm-debug-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: d862f8c63ca4ee6f7b94ea1ef36f165b
SHA-256: 587b4f376c1d2ed19f30c8e1287351061942d9da7bf28f93c05045bb923c002e
kvm-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 9e1e4ef4ad04cb570c3206c01014c4ce
SHA-256: cb46097309f100eea7db2377c457df79e72cb8ea7b2897478b66b5cc0b3a773a
kvm-qemu-img-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 64e4739109056885cc8e5d9a8c50ee1c
SHA-256: 67cb8caea7e3ba5dd719e888d4a51bb9dc96c0b61966a4d528da6467e36bb81c
kvm-tools-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 6dede3fa0fd79271e52a3d7d09f59551
SHA-256: 33f9484094182b301c681098ebef328590ed2a9c539d9ac89321df9dd86e7405
 
RHEL Virtualization (v. 5 server)

SRPMS:
kvm-83-239.el5.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 787886220366306f3ecc5160eea111fe
SHA-256: d938d404cb0181f9e7cc9abfd6d4662d9d79c5ac002bd05d39fcfb41e4d38543
 
x86_64:
kmod-kvm-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 5b75d6125a205b1dcc6a5028023266f7
SHA-256: 11abf568cbf070accaa2b83a8a4ee4896ecbd31eece16ce9bd5987be0ff489f4
kmod-kvm-debug-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: d862f8c63ca4ee6f7b94ea1ef36f165b
SHA-256: 587b4f376c1d2ed19f30c8e1287351061942d9da7bf28f93c05045bb923c002e
kvm-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 9e1e4ef4ad04cb570c3206c01014c4ce
SHA-256: cb46097309f100eea7db2377c457df79e72cb8ea7b2897478b66b5cc0b3a773a
kvm-qemu-img-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 64e4739109056885cc8e5d9a8c50ee1c
SHA-256: 67cb8caea7e3ba5dd719e888d4a51bb9dc96c0b61966a4d528da6467e36bb81c
kvm-tools-83-239.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 6dede3fa0fd79271e52a3d7d09f59551
SHA-256: 33f9484094182b301c681098ebef328590ed2a9c539d9ac89321df9dd86e7405
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

561224 - BSOD when execute sandra muti-media benchmark
586173 - qemu monitor always use read-write type for the changed cd
644706 - QEMU monitor hangs on first command when attempting start a guest with an encrypted qcow2 image
644793 - qemu-kvm -no-kvm segfaults on pci_add
657149 - guest with passthrough nic got kernel panic when send system_reset signal in QEMU monitor
659172 - [WHQL] pwrtest failed in the job "CHAOS-Concurrent Hardware And OS test"
665023 - lost double clicks on slow connections
677614 - QEMU should report the PID of the process that sent it signals for troubleshooting purposes
713389 - Migration from host RHEL5.7 to host RHEL5.6.z failed with floppy
713392 - Increase migration max_downtime/or speed cause guest stalls.


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/