Skip to navigation

Bug Fix Advisory qemu-kvm bug fix update

Advisory: RHBA-2012:1121-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-07-30
Last updated on: 2012-07-30
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated qemu-kvm packages that fix two bugs are now available for Red Hat
Enterprise Linux 6.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. The qemu-kvm packages form the user-space
component for running virtual machines using KVM.

This update fixes the following bugs:

* Previously, the KVM modules were not loaded by the postinstall scriplet of RPM
scripts. This bug caused various issues and required the system to be rebooted
to resolve them. With this update, the modules are loaded properly by the
scriptlet and no unnecessary reboots are now required. (BZ#839897)

* Previously, when a guest was started up with two serial devices, qemu-kvm
returned an error message and terminated the boot because IRQ 4 for the ISA bus
was being used by both devices. This update fixes the qemu-kvm code, which
allows IRQ 4 to be used by more than one device on the ISA bus, and the boot now
succeeds in the described scenario. (BZ#840054)

All users of qemu-kvm are advised to upgrade to these updated packages, which
fix these bugs. After installing this update, shut down all running virtual
machines. Once all virtual machines have shut down, start them again for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.1.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: a818e75eb900f02026f7ab0dd9ac8785
SHA-256: 238dbd465ef25fdaa8dec532d8ec0c36f1719f3ae3ebaaa4aaf1d2bcce381b0e
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a045c2d2b4fcb012f4202502e2ff449e
SHA-256: 13e8bd69b78c89d160948f5c95209c3853db3868a52bbea44aaa7823e1ed8472
qemu-img-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: de53f0a5db5e4200769571b5c52c7b8e
SHA-256: 8450cdc5ff7c59f66f5c44108c2ec660395ed00348958ec25d5997b47e056809
qemu-kvm-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 78dd30d30588c207975cdd1755161cf9
SHA-256: f19a0995ad0084c9e87e17608c7cb40f85282d62fecb58db84795b5b90ca8826
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: dbb675b20e36c94d687024a1906a2314
SHA-256: ebaf29d63f41d55d437c74c1434758c0e7c8a1bbf0cb0def4f3d684905a5cf5e
qemu-kvm-tools-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: f6e0a5a6e8aecb14c91884951b4a25f2
SHA-256: 7dbf4d8f7fc7c0d5730cccea9cb4ec5bcac312fe14c6f87ce949c0597e2d0864
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.1.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: a818e75eb900f02026f7ab0dd9ac8785
SHA-256: 238dbd465ef25fdaa8dec532d8ec0c36f1719f3ae3ebaaa4aaf1d2bcce381b0e
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a045c2d2b4fcb012f4202502e2ff449e
SHA-256: 13e8bd69b78c89d160948f5c95209c3853db3868a52bbea44aaa7823e1ed8472
qemu-img-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: de53f0a5db5e4200769571b5c52c7b8e
SHA-256: 8450cdc5ff7c59f66f5c44108c2ec660395ed00348958ec25d5997b47e056809
qemu-kvm-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 78dd30d30588c207975cdd1755161cf9
SHA-256: f19a0995ad0084c9e87e17608c7cb40f85282d62fecb58db84795b5b90ca8826
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: dbb675b20e36c94d687024a1906a2314
SHA-256: ebaf29d63f41d55d437c74c1434758c0e7c8a1bbf0cb0def4f3d684905a5cf5e
qemu-kvm-tools-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: f6e0a5a6e8aecb14c91884951b4a25f2
SHA-256: 7dbf4d8f7fc7c0d5730cccea9cb4ec5bcac312fe14c6f87ce949c0597e2d0864
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.1.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: a818e75eb900f02026f7ab0dd9ac8785
SHA-256: 238dbd465ef25fdaa8dec532d8ec0c36f1719f3ae3ebaaa4aaf1d2bcce381b0e
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a045c2d2b4fcb012f4202502e2ff449e
SHA-256: 13e8bd69b78c89d160948f5c95209c3853db3868a52bbea44aaa7823e1ed8472
qemu-img-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: de53f0a5db5e4200769571b5c52c7b8e
SHA-256: 8450cdc5ff7c59f66f5c44108c2ec660395ed00348958ec25d5997b47e056809
qemu-kvm-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 78dd30d30588c207975cdd1755161cf9
SHA-256: f19a0995ad0084c9e87e17608c7cb40f85282d62fecb58db84795b5b90ca8826
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: dbb675b20e36c94d687024a1906a2314
SHA-256: ebaf29d63f41d55d437c74c1434758c0e7c8a1bbf0cb0def4f3d684905a5cf5e
qemu-kvm-tools-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: f6e0a5a6e8aecb14c91884951b4a25f2
SHA-256: 7dbf4d8f7fc7c0d5730cccea9cb4ec5bcac312fe14c6f87ce949c0597e2d0864
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.1.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: a818e75eb900f02026f7ab0dd9ac8785
SHA-256: 238dbd465ef25fdaa8dec532d8ec0c36f1719f3ae3ebaaa4aaf1d2bcce381b0e
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: a045c2d2b4fcb012f4202502e2ff449e
SHA-256: 13e8bd69b78c89d160948f5c95209c3853db3868a52bbea44aaa7823e1ed8472
qemu-img-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: de53f0a5db5e4200769571b5c52c7b8e
SHA-256: 8450cdc5ff7c59f66f5c44108c2ec660395ed00348958ec25d5997b47e056809
qemu-kvm-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: 78dd30d30588c207975cdd1755161cf9
SHA-256: f19a0995ad0084c9e87e17608c7cb40f85282d62fecb58db84795b5b90ca8826
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: dbb675b20e36c94d687024a1906a2314
SHA-256: ebaf29d63f41d55d437c74c1434758c0e7c8a1bbf0cb0def4f3d684905a5cf5e
qemu-kvm-tools-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: f6e0a5a6e8aecb14c91884951b4a25f2
SHA-256: 7dbf4d8f7fc7c0d5730cccea9cb4ec5bcac312fe14c6f87ce949c0597e2d0864
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.1.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: a818e75eb900f02026f7ab0dd9ac8785
SHA-256: 238dbd465ef25fdaa8dec532d8ec0c36f1719f3ae3ebaaa4aaf1d2bcce381b0e
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a045c2d2b4fcb012f4202502e2ff449e
SHA-256: 13e8bd69b78c89d160948f5c95209c3853db3868a52bbea44aaa7823e1ed8472
qemu-img-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: de53f0a5db5e4200769571b5c52c7b8e
SHA-256: 8450cdc5ff7c59f66f5c44108c2ec660395ed00348958ec25d5997b47e056809
qemu-kvm-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 78dd30d30588c207975cdd1755161cf9
SHA-256: f19a0995ad0084c9e87e17608c7cb40f85282d62fecb58db84795b5b90ca8826
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: dbb675b20e36c94d687024a1906a2314
SHA-256: ebaf29d63f41d55d437c74c1434758c0e7c8a1bbf0cb0def4f3d684905a5cf5e
qemu-kvm-tools-0.12.1.2-2.295.el6_3.1.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: f6e0a5a6e8aecb14c91884951b4a25f2
SHA-256: 7dbf4d8f7fc7c0d5730cccea9cb4ec5bcac312fe14c6f87ce949c0597e2d0864
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

840054 - guest fails with error: isa irq 4 already assigned when starting guest with more than two serial devices



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/