Skip to navigation

Bug Fix Advisory qemu-kvm bug fix update

Advisory: RHBA-2012:1519-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-12-04
Last updated on: 2012-12-04
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated qemu-kvm packages that fix a bug are now available for Red Hat
Enterprise Linux 6.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. The qemu-kvm packages form the user-space
component for running virtual machines using KVM.

This update fixes the following bug:

* In the SVVP (Server Virtualization Validation Program) environment, when the
e1000 network driver was used, the PCI Hardware Compliance Test For Systems job
failed. Consequently, the HCK (Hardware Certification Kit) SVVP certification
could not be passed on the system. A patch has been provided to address this
issue and the test now passes in the described scenario. (BZ#873270)

All users of qemu-kvm are advised to upgrade to these updated packages, which
fix this bug. After installing this update, shut down all running virtual
machines. Once all virtual machines have shut down, start them again for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.8.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f4614793c016f57dcc3a09962faaee8
SHA-256: 93a85d89d7a25651e2ad67c75946c492675d6daaabe5db9fa49c58b0c2b175ce
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 60b93d5644f7568fbedad96c934a0e93
SHA-256: b76e3974744b54e02a0e19155b4229d799485c255c30d0250b6ed39dd105a6f2
qemu-img-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 2ab1be7395c1a8c764e3055e9b0aaac2
SHA-256: 953c9f90b569d5df6eebb51a00abbe94237b3e0a276840406425302d54801617
qemu-kvm-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 56ea9bf6a162ac7fa95af2d5713c7a41
SHA-256: 590ec75beaeb0e7e1bac4e4167be44e3a1a7534b0f0f3dff31c72ebb108fbc18
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c4128428a9d74bdaa840bb5281a65ab1
SHA-256: 0c6d30891ff647bb948c7f0b2c1a614023def6ebbfdc4338d527688dda37e9a1
qemu-kvm-tools-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 71df1d561ca55fef48a183634ece6c4a
SHA-256: b112fddb88d2ffc72c15d72986247296c601e410c3deb62bc59b033d4b186e70
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.8.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f4614793c016f57dcc3a09962faaee8
SHA-256: 93a85d89d7a25651e2ad67c75946c492675d6daaabe5db9fa49c58b0c2b175ce
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 60b93d5644f7568fbedad96c934a0e93
SHA-256: b76e3974744b54e02a0e19155b4229d799485c255c30d0250b6ed39dd105a6f2
qemu-img-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 2ab1be7395c1a8c764e3055e9b0aaac2
SHA-256: 953c9f90b569d5df6eebb51a00abbe94237b3e0a276840406425302d54801617
qemu-kvm-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 56ea9bf6a162ac7fa95af2d5713c7a41
SHA-256: 590ec75beaeb0e7e1bac4e4167be44e3a1a7534b0f0f3dff31c72ebb108fbc18
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c4128428a9d74bdaa840bb5281a65ab1
SHA-256: 0c6d30891ff647bb948c7f0b2c1a614023def6ebbfdc4338d527688dda37e9a1
qemu-kvm-tools-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 71df1d561ca55fef48a183634ece6c4a
SHA-256: b112fddb88d2ffc72c15d72986247296c601e410c3deb62bc59b033d4b186e70
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.8.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f4614793c016f57dcc3a09962faaee8
SHA-256: 93a85d89d7a25651e2ad67c75946c492675d6daaabe5db9fa49c58b0c2b175ce
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 60b93d5644f7568fbedad96c934a0e93
SHA-256: b76e3974744b54e02a0e19155b4229d799485c255c30d0250b6ed39dd105a6f2
qemu-img-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 2ab1be7395c1a8c764e3055e9b0aaac2
SHA-256: 953c9f90b569d5df6eebb51a00abbe94237b3e0a276840406425302d54801617
qemu-kvm-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 56ea9bf6a162ac7fa95af2d5713c7a41
SHA-256: 590ec75beaeb0e7e1bac4e4167be44e3a1a7534b0f0f3dff31c72ebb108fbc18
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c4128428a9d74bdaa840bb5281a65ab1
SHA-256: 0c6d30891ff647bb948c7f0b2c1a614023def6ebbfdc4338d527688dda37e9a1
qemu-kvm-tools-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 71df1d561ca55fef48a183634ece6c4a
SHA-256: b112fddb88d2ffc72c15d72986247296c601e410c3deb62bc59b033d4b186e70
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.8.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f4614793c016f57dcc3a09962faaee8
SHA-256: 93a85d89d7a25651e2ad67c75946c492675d6daaabe5db9fa49c58b0c2b175ce
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: 60b93d5644f7568fbedad96c934a0e93
SHA-256: b76e3974744b54e02a0e19155b4229d799485c255c30d0250b6ed39dd105a6f2
qemu-img-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: 2ab1be7395c1a8c764e3055e9b0aaac2
SHA-256: 953c9f90b569d5df6eebb51a00abbe94237b3e0a276840406425302d54801617
qemu-kvm-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: 56ea9bf6a162ac7fa95af2d5713c7a41
SHA-256: 590ec75beaeb0e7e1bac4e4167be44e3a1a7534b0f0f3dff31c72ebb108fbc18
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: c4128428a9d74bdaa840bb5281a65ab1
SHA-256: 0c6d30891ff647bb948c7f0b2c1a614023def6ebbfdc4338d527688dda37e9a1
qemu-kvm-tools-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHBA-2012:1582
    MD5: 71df1d561ca55fef48a183634ece6c4a
SHA-256: b112fddb88d2ffc72c15d72986247296c601e410c3deb62bc59b033d4b186e70
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.8.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f4614793c016f57dcc3a09962faaee8
SHA-256: 93a85d89d7a25651e2ad67c75946c492675d6daaabe5db9fa49c58b0c2b175ce
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 60b93d5644f7568fbedad96c934a0e93
SHA-256: b76e3974744b54e02a0e19155b4229d799485c255c30d0250b6ed39dd105a6f2
qemu-img-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 2ab1be7395c1a8c764e3055e9b0aaac2
SHA-256: 953c9f90b569d5df6eebb51a00abbe94237b3e0a276840406425302d54801617
qemu-kvm-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 56ea9bf6a162ac7fa95af2d5713c7a41
SHA-256: 590ec75beaeb0e7e1bac4e4167be44e3a1a7534b0f0f3dff31c72ebb108fbc18
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c4128428a9d74bdaa840bb5281a65ab1
SHA-256: 0c6d30891ff647bb948c7f0b2c1a614023def6ebbfdc4338d527688dda37e9a1
qemu-kvm-tools-0.12.1.2-2.295.el6_3.8.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 71df1d561ca55fef48a183634ece6c4a
SHA-256: b112fddb88d2ffc72c15d72986247296c601e410c3deb62bc59b033d4b186e70
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

873270 - [hck][svvp] PCI Hardware Compliance Test for Systems job failed when e1000 is in use



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/