- Issued:
- 2015-05-07
- Updated:
- 2015-05-07
RHBA-2015:0952 - Bug Fix Advisory
Synopsis
qemu-kvm-rhev bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated qemu-kvm-rhev packages that fix one bug are now available for Red Hat Enterprise Linux 7.
Description
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages provide
the user space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
This update fixes the following bug:
- On a virtual disk with a high number of sectors, the number of sectors was in some cases handled incorrectly, and converting a QEMU image failed with an "invalid argument" error. This update fixes the incorrect calculation that caused this error, and the described failure no longer occurs. (BZ#1203543)
Users of qemu-kvm-rhev are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
Fixes
- BZ - 1203543 - bdrv_make_zero() passes a too large nb_sectors value to bdrv_write_zeroes()
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
qemu-kvm-rhev-2.1.2-23.el7_1.2.src.rpm | SHA-256: cf72ab922b91ad6149e8e60adae3ee99584b9a8f86706642af8ea0d9c18d76f1 |
x86_64 | |
libcacard-devel-rhev-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: affd75415cd6807640a91304fff411cfc2245372b9561655f677224af2866481 |
libcacard-rhev-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: 4deed5dc10ab269acc7028c37f1fa91cc4f680db98f247f6a6d9ff2d9d863bd3 |
libcacard-tools-rhev-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: a972e5ac80d97439e3a64fae547f00b21449aa1f5a9440f08f40339afeef8c37 |
qemu-img-rhev-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: 87a2b305b9cc6c6ed4f793c8fb1c71ea81bbf9224db473f8d2f785408d4d89d5 |
qemu-kvm-common-rhev-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: b0a7b7b66109952f2d871de3d6d1881ff0451b54ac836eb195ac0092c54ae76d |
qemu-kvm-rhev-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: 6f05843521c8fa9cf591299d1c1d260a3e54d4a2a96c110db3f5f4166c38be6c |
qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: fdc6301f1c4eafcaa1c570fb29a72aaa720a14bd21c09e654b0cc36463218628 |
qemu-kvm-tools-rhev-2.1.2-23.el7_1.2.x86_64.rpm | SHA-256: aa54f36464f735e0394e6d21b8b935dad8f69788f397ac26b56c1199dc0aae6c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.