Skip to navigation

Bug Fix Advisory qemu-kvm bug fix update

Advisory: RHBA-2012:0572-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-05-14
Last updated on: 2012-05-14
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated qemu-kvm packages that fix two bugs are now available for Red Hat
Enterprise Linux 6.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. The qemu-kvm packages form the user-space
component for running virtual machines using KVM.

This update fixes the following bugs:

* Previously, QEMU did not support 2000x2000 screen resolution. This resolution
is now supported. (BZ#799002)

* Previously, the free() function was missing in management of the "xsave"
processor state. This led to memory leaks in qemu-kvm when a guest used the
xsave functionality, causing excessive memory consumption on the host. Buffers
used to manage xsave support are now freed after use so that qemu-kvm no longer
leaks memory. (BZ#805550)

All users of qemu-kvm are advised to upgrade to these updated packages, which
fix these bugs. After installing this update, shut down all running virtual
machines. Once all virtual machines have shut down, start them again for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.209.el6_2.5.src.rpm
File outdated by:  RHBA-2014:0360
    MD5: cf1540a0d34c0fd4321fbe45a5783eb4
SHA-256: 44433a3e0eae69be07982c7e83c81fd8b3f93b6e9b5fa3b529640a59279f1bf1
 
x86_64:
qemu-img-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 2406808696166428a31a0ea5a8b8ce7b
SHA-256: 79f8894013dc79dd65eb32bba737915873cb565e8a19747a05b1e54a136ab1a5
qemu-kvm-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 6d24e06a2cc7c2d27af7a696a233faf1
SHA-256: 250c018977d084c21c8aafe63211bc8f558be4e9111e830c49178ade2da6fa76
qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: c69a18a2c3f2425c6c68c8ee85bab990
SHA-256: b12703a8f82055d8594221a09b6ae6506664fe383efc4092e215bd972a45eac1
qemu-kvm-tools-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 0d7b5f83b341f793afceb4f3cf1fbc32
SHA-256: b1171150053b4eab4946a510e41c526cd6039db0b202c42e4151b3204925a03e
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.209.el6_2.5.src.rpm
File outdated by:  RHBA-2014:0360
    MD5: cf1540a0d34c0fd4321fbe45a5783eb4
SHA-256: 44433a3e0eae69be07982c7e83c81fd8b3f93b6e9b5fa3b529640a59279f1bf1
 
x86_64:
qemu-img-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 2406808696166428a31a0ea5a8b8ce7b
SHA-256: 79f8894013dc79dd65eb32bba737915873cb565e8a19747a05b1e54a136ab1a5
qemu-kvm-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 6d24e06a2cc7c2d27af7a696a233faf1
SHA-256: 250c018977d084c21c8aafe63211bc8f558be4e9111e830c49178ade2da6fa76
qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: c69a18a2c3f2425c6c68c8ee85bab990
SHA-256: b12703a8f82055d8594221a09b6ae6506664fe383efc4092e215bd972a45eac1
qemu-kvm-tools-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 0d7b5f83b341f793afceb4f3cf1fbc32
SHA-256: b1171150053b4eab4946a510e41c526cd6039db0b202c42e4151b3204925a03e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.209.el6_2.5.src.rpm
File outdated by:  RHBA-2014:0360
    MD5: cf1540a0d34c0fd4321fbe45a5783eb4
SHA-256: 44433a3e0eae69be07982c7e83c81fd8b3f93b6e9b5fa3b529640a59279f1bf1
 
x86_64:
qemu-img-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 2406808696166428a31a0ea5a8b8ce7b
SHA-256: 79f8894013dc79dd65eb32bba737915873cb565e8a19747a05b1e54a136ab1a5
qemu-kvm-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 6d24e06a2cc7c2d27af7a696a233faf1
SHA-256: 250c018977d084c21c8aafe63211bc8f558be4e9111e830c49178ade2da6fa76
qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: c69a18a2c3f2425c6c68c8ee85bab990
SHA-256: b12703a8f82055d8594221a09b6ae6506664fe383efc4092e215bd972a45eac1
qemu-kvm-tools-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 0d7b5f83b341f793afceb4f3cf1fbc32
SHA-256: b1171150053b4eab4946a510e41c526cd6039db0b202c42e4151b3204925a03e
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
qemu-kvm-0.12.1.2-2.209.el6_2.5.src.rpm
File outdated by:  RHBA-2014:0360
    MD5: cf1540a0d34c0fd4321fbe45a5783eb4
SHA-256: 44433a3e0eae69be07982c7e83c81fd8b3f93b6e9b5fa3b529640a59279f1bf1
 
x86_64:
qemu-img-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: 2406808696166428a31a0ea5a8b8ce7b
SHA-256: 79f8894013dc79dd65eb32bba737915873cb565e8a19747a05b1e54a136ab1a5
qemu-kvm-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: 6d24e06a2cc7c2d27af7a696a233faf1
SHA-256: 250c018977d084c21c8aafe63211bc8f558be4e9111e830c49178ade2da6fa76
qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: c69a18a2c3f2425c6c68c8ee85bab990
SHA-256: b12703a8f82055d8594221a09b6ae6506664fe383efc4092e215bd972a45eac1
qemu-kvm-tools-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: 0d7b5f83b341f793afceb4f3cf1fbc32
SHA-256: b1171150053b4eab4946a510e41c526cd6039db0b202c42e4151b3204925a03e
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
qemu-kvm-0.12.1.2-2.209.el6_2.5.src.rpm
File outdated by:  RHBA-2014:0360
    MD5: cf1540a0d34c0fd4321fbe45a5783eb4
SHA-256: 44433a3e0eae69be07982c7e83c81fd8b3f93b6e9b5fa3b529640a59279f1bf1
 
x86_64:
qemu-img-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: 2406808696166428a31a0ea5a8b8ce7b
SHA-256: 79f8894013dc79dd65eb32bba737915873cb565e8a19747a05b1e54a136ab1a5
qemu-kvm-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: 6d24e06a2cc7c2d27af7a696a233faf1
SHA-256: 250c018977d084c21c8aafe63211bc8f558be4e9111e830c49178ade2da6fa76
qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: c69a18a2c3f2425c6c68c8ee85bab990
SHA-256: b12703a8f82055d8594221a09b6ae6506664fe383efc4092e215bd972a45eac1
qemu-kvm-tools-0.12.1.2-2.209.el6_2.5.x86_64.rpm     MD5: 0d7b5f83b341f793afceb4f3cf1fbc32
SHA-256: b1171150053b4eab4946a510e41c526cd6039db0b202c42e4151b3204925a03e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.209.el6_2.5.src.rpm
File outdated by:  RHBA-2014:0360
    MD5: cf1540a0d34c0fd4321fbe45a5783eb4
SHA-256: 44433a3e0eae69be07982c7e83c81fd8b3f93b6e9b5fa3b529640a59279f1bf1
 
x86_64:
qemu-img-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 2406808696166428a31a0ea5a8b8ce7b
SHA-256: 79f8894013dc79dd65eb32bba737915873cb565e8a19747a05b1e54a136ab1a5
qemu-kvm-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 6d24e06a2cc7c2d27af7a696a233faf1
SHA-256: 250c018977d084c21c8aafe63211bc8f558be4e9111e830c49178ade2da6fa76
qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: c69a18a2c3f2425c6c68c8ee85bab990
SHA-256: b12703a8f82055d8594221a09b6ae6506664fe383efc4092e215bd972a45eac1
qemu-kvm-tools-0.12.1.2-2.209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2014:0360
    MD5: 0d7b5f83b341f793afceb4f3cf1fbc32
SHA-256: b1171150053b4eab4946a510e41c526cd6039db0b202c42e4151b3204925a03e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

805550 - Fix memory leak in register save load due to xsave support



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/