- Issued:
- 2011-08-25
- Updated:
- 2011-08-25
RHBA-2011:1211 - qemu-kvm bug fix update
Synopsis
qemu-kvm bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated qemu-kvm packages that resolve several issues are now available for Red Hat Enterprise Linux 6.
Description
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on AMD64 and Intel 64 systems that is built into the standard Red Hat Enterprise Linux kernel. The qemu-kvm packages form the user-space component for running virtual machines using KVM.
These updated qemu-kvm packages provide fixes for the following bugs:
-
When the virsh dump command was executed with the "--live" option, the subsequent virsh dump command for the same domain led to undefined behavior. This was caused by a function trying to deallocate memory that had already been freed. To avoid this issue, the log field of the vhost device structure is now set to NULL after it has been passed to a deallocating routine. Running the virsh dump command repeatedly no longer leads to undefined behavior, and a core dump of a guest is now collected. (BZ#726609)
-
Previously, a particular device using the tg3 driver failed to be re-assigned on a running KVM guest. The Broadcom Corporation NetXtreme BCM5761 Gigabit Ethernet PCIe network controller provides a PCI-Express Cap structure that is 8 bytes shorter than it should be according the PCI-Express 2.0 specification. This fact resulted in memory corruption when it was allocated for device assignment. The code has been modified to accept the reduced size of the structure. BCM5761 can now be successfully re-assigned. (BZ#727468)
-
When KVM guests were launched with the "-device isa-serial" option instead of the "-serial" option, serial devices created were not visible by Windows guests. This issue arose because QEMU did not expose these devices in the guests' ACPI tables. With this fix, the guest's ACPI Differentiated System Description Table (DSDT) now properly senses the presence of serial devices and Windows guests can now see them properly. (BZ#727896)
All users of qemu-kvm are advised to upgrade to these updated packages, which resolve these issues.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Virtual Storage Appliance (from RHUI) | 6.1 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 6.1 | x86_64 |
| Red Hat Enterprise Linux for Scientific Computing | 6 | x86_64 |
| Red Hat Enterprise Linux Workstation | 6 | x86_64 |
| Red Hat Enterprise Linux Server | 6 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Update Support from RHUI | 6.1 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension | 6 | x86_64 |
| Red Hat Enterprise Linux Desktop | 6 | x86_64 |
Updated Packages
- qemu-kvm-0.12.1.2-2.160.el6_1.8.x86_64.rpm
- qemu-kvm-0.12.1.2-2.160.el6_1.8.src.rpm
- qemu-img-0.12.1.2-2.160.el6_1.8.x86_64.rpm
- qemu-kvm-tools-0.12.1.2-2.160.el6_1.8.x86_64.rpm
- qemu-kvm-debuginfo-0.12.1.2-2.160.el6_1.8.x86_64.rpm
Fixes
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.