Skip to navigation

Bug Fix Advisory qemu-kvm bug fix update

Advisory: RHBA-2012:1582-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-12-18
Last updated on: 2012-12-18
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated qemu-kvm packages that fix a bug are now available for Red Hat
Enterprise Linux 6.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. The qemu-kvm packages form the user-space
component for running virtual machines using KVM.

This update fixes the following bug:

* When the vdsm daemon was running on a blocking NFS storage, it attempted to
continuously access the storage. Consequently, vdsm could become unresponsive
for almost an hour. This bug has been fixed and vdsm is now able to recover
within a few minutes in the described scenario. (BZ#886101)

All users of qemu-kvm are advised to upgrade to these updated packages, which
fix this bug. After installing this update, shut down all running virtual
machines. Once all virtual machines have shut down, start them again for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.10.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: eefc84d3316e59a01c9c64a36edb9038
SHA-256: 256ef459623f5baf8efc2929a8816f26a54dd7b03a825715161f9d951cc8ddde
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a211b4f6f08802646430c5431a180a20
SHA-256: 7b72f81476523783cdf838b7769c9e17034c76f06fa378ba3088a76c1744e755
qemu-img-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: cd83e5d3fb8feec34fc8486c3dd4a69b
SHA-256: 50a835fe110f9e4b87c2156edbd186f668638fe0f1143e5755e3e5c893f97605
qemu-kvm-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c52f0c8288b3a6ce29559fb32b4b7956
SHA-256: 0f67e6f9426f60c423c90545046da2dea5a17087e75e7b7ccdd0c3c11737b964
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: ee716648880497ec8c1e983362697252
SHA-256: 93fd5ab4489882786291b47543a0f7fa6f5604d70710b4643172dcf20a5f5326
qemu-kvm-tools-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa8fa2b2939980126f6438cb280fa5ea
SHA-256: 30a5dc025faad939a493cfc6e5a1f13a9b750365d71ebe1e27dce2b2b084a623
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.10.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: eefc84d3316e59a01c9c64a36edb9038
SHA-256: 256ef459623f5baf8efc2929a8816f26a54dd7b03a825715161f9d951cc8ddde
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a211b4f6f08802646430c5431a180a20
SHA-256: 7b72f81476523783cdf838b7769c9e17034c76f06fa378ba3088a76c1744e755
qemu-img-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: cd83e5d3fb8feec34fc8486c3dd4a69b
SHA-256: 50a835fe110f9e4b87c2156edbd186f668638fe0f1143e5755e3e5c893f97605
qemu-kvm-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c52f0c8288b3a6ce29559fb32b4b7956
SHA-256: 0f67e6f9426f60c423c90545046da2dea5a17087e75e7b7ccdd0c3c11737b964
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: ee716648880497ec8c1e983362697252
SHA-256: 93fd5ab4489882786291b47543a0f7fa6f5604d70710b4643172dcf20a5f5326
qemu-kvm-tools-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa8fa2b2939980126f6438cb280fa5ea
SHA-256: 30a5dc025faad939a493cfc6e5a1f13a9b750365d71ebe1e27dce2b2b084a623
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.10.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: eefc84d3316e59a01c9c64a36edb9038
SHA-256: 256ef459623f5baf8efc2929a8816f26a54dd7b03a825715161f9d951cc8ddde
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a211b4f6f08802646430c5431a180a20
SHA-256: 7b72f81476523783cdf838b7769c9e17034c76f06fa378ba3088a76c1744e755
qemu-img-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: cd83e5d3fb8feec34fc8486c3dd4a69b
SHA-256: 50a835fe110f9e4b87c2156edbd186f668638fe0f1143e5755e3e5c893f97605
qemu-kvm-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c52f0c8288b3a6ce29559fb32b4b7956
SHA-256: 0f67e6f9426f60c423c90545046da2dea5a17087e75e7b7ccdd0c3c11737b964
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: ee716648880497ec8c1e983362697252
SHA-256: 93fd5ab4489882786291b47543a0f7fa6f5604d70710b4643172dcf20a5f5326
qemu-kvm-tools-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa8fa2b2939980126f6438cb280fa5ea
SHA-256: 30a5dc025faad939a493cfc6e5a1f13a9b750365d71ebe1e27dce2b2b084a623
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.10.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: eefc84d3316e59a01c9c64a36edb9038
SHA-256: 256ef459623f5baf8efc2929a8816f26a54dd7b03a825715161f9d951cc8ddde
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.10.x86_64.rpm     MD5: a211b4f6f08802646430c5431a180a20
SHA-256: 7b72f81476523783cdf838b7769c9e17034c76f06fa378ba3088a76c1744e755
qemu-img-0.12.1.2-2.295.el6_3.10.x86_64.rpm     MD5: cd83e5d3fb8feec34fc8486c3dd4a69b
SHA-256: 50a835fe110f9e4b87c2156edbd186f668638fe0f1143e5755e3e5c893f97605
qemu-kvm-0.12.1.2-2.295.el6_3.10.x86_64.rpm     MD5: c52f0c8288b3a6ce29559fb32b4b7956
SHA-256: 0f67e6f9426f60c423c90545046da2dea5a17087e75e7b7ccdd0c3c11737b964
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.10.x86_64.rpm     MD5: ee716648880497ec8c1e983362697252
SHA-256: 93fd5ab4489882786291b47543a0f7fa6f5604d70710b4643172dcf20a5f5326
qemu-kvm-tools-0.12.1.2-2.295.el6_3.10.x86_64.rpm     MD5: fa8fa2b2939980126f6438cb280fa5ea
SHA-256: 30a5dc025faad939a493cfc6e5a1f13a9b750365d71ebe1e27dce2b2b084a623
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.295.el6_3.10.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: eefc84d3316e59a01c9c64a36edb9038
SHA-256: 256ef459623f5baf8efc2929a8816f26a54dd7b03a825715161f9d951cc8ddde
 
x86_64:
qemu-guest-agent-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a211b4f6f08802646430c5431a180a20
SHA-256: 7b72f81476523783cdf838b7769c9e17034c76f06fa378ba3088a76c1744e755
qemu-img-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: cd83e5d3fb8feec34fc8486c3dd4a69b
SHA-256: 50a835fe110f9e4b87c2156edbd186f668638fe0f1143e5755e3e5c893f97605
qemu-kvm-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: c52f0c8288b3a6ce29559fb32b4b7956
SHA-256: 0f67e6f9426f60c423c90545046da2dea5a17087e75e7b7ccdd0c3c11737b964
qemu-kvm-debuginfo-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: ee716648880497ec8c1e983362697252
SHA-256: 93fd5ab4489882786291b47543a0f7fa6f5604d70710b4643172dcf20a5f5326
qemu-kvm-tools-0.12.1.2-2.295.el6_3.10.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa8fa2b2939980126f6438cb280fa5ea
SHA-256: 30a5dc025faad939a493cfc6e5a1f13a9b750365d71ebe1e27dce2b2b084a623
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

886101 - vdsm: vdsm is stuck in recovery for almost an hour on NFS storage with running vm's when blocking storage from host



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/