Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2013:0527 - Bug Fix Advisory
Issued:
2013-02-20
Updated:
2013-02-20

RHBA-2013:0527 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

qemu-kvm bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated qemu-kvm packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems that is built into the standard Red Hat Enterprise
Linux kernel. The qemu-kvm packages form the user-space component for running
virtual machines using KVM.

These updated qemu-kvm packages include numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users are
directed to the Red Hat Enterprise Linux 6.4 Technical Notes for information on
the most significant of these changes:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/qemu-kvm.html

All users of qemu-kvm are advised to upgrade to these updated packages, which
fix these bugs and add these enhancements.

Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386

Fixes

  • BZ - 607510 - Windows7 guest cannot resume after suspended to disk after plenty of pause:resume iterations - e1000
  • BZ - 680356 - Live migration failed in ipv6 environment
  • BZ - 689665 - Specify the number of cpu cores failed with cpu model Nehalem Penryn and Conroe
  • BZ - 691638 - x2apic is not exported to guest when boot guest with -cpu host
  • BZ - 729244 - floppy does not show in guest after change floppy from no inserted to new file
  • BZ - 745717 - SEP flag is not exposed to guest, but is defined on CPU model config
  • BZ - 755594 - -m 1 crashes
  • BZ - 770842 - RFE: qemu-kvm: qxl device should support multiple monitors
  • BZ - 771624 - guest fails with error: isa irq 4 already assigned when starting guest with more than two serial devices
  • BZ - 784496 - Device assignment doesn't get updated for guest irq pinning
  • BZ - 787723 - Backport qemu-ga for Windows
  • BZ - 794653 - Finnish keymap has errors
  • BZ - 796043 - 'getaddrinfo(127.0.0.1,5902): Name or service not known' when starting guest on host with IPv6 only
  • BZ - 797728 - qemu-kvm allows a value of -1 for uint32 qdev property types
  • BZ - 799028 - [RFE] Add command line option to enable bmi1 feature on AMD processors
  • BZ - 801063 - [RFE] Ability to configure sound pass-through to appear as MIC as opposed to line-in
  • BZ - 801143 - Windows Guest Agent leaks ov.hEvent in ga_channel_write()
  • BZ - 805172 - Add live migration support for USB
  • BZ - 805501 - qemu-kvm core dumped while sending system_reset to a virtio-scsi guest
  • BZ - 805533 - qemu-ga: possible race while suspending the guest
  • BZ - 806768 - -qmp stdio is unusable
  • BZ - 806775 - QMP: add errno information to OpenFileFailed error
  • BZ - 808653 - Audio quality is very bad when playing audio via passthroughed USB speaker in guest
  • BZ - 808660 - RFE - Virtio-scsi should support block_resize
  • BZ - 808664 - With virtio-scsi disk guest can't resume form "No space left on device"
  • BZ - 813633 - need to update qemu-kvm about "-vnc" option for "password" in man page
  • BZ - 813713 - Windows guest can't drive more than 21 usb-storage devices
  • BZ - 814084 - scsi disk emulation doesn't enforce FUA (Force Unit Access) on writes
  • BZ - 814426 - "rdtscp" flag defined on SandyBridge and Opteron models, but not supported by the kernel
  • BZ - 815180 - No 32bit qemu-guest-agent sub-package generated
  • BZ - 816575 - backing clusters of the image convert with -B are allocated when they shouldn't
  • BZ - 816804 - NUMA information(memory and cpu) set should be the same as configure in command line
  • BZ - 816893 - qemu-ga: commands may fail before a 'guest-ping'
  • BZ - 817224 - there is no "-nodefaults" option help doc in qemu-kvm man page
  • BZ - 818134 - '-writeconfig/-readconfig' option need to update in qemu-kvm manpage
  • BZ - 819457 - windows 2k8r2sp1 guests hang after running over 10 days in a stressed host
  • BZ - 819915 - e1000: Fix multi-descriptor packet checksum offload
  • BZ - 820136 - RFE: Improve qxl logging by adding trace-events from upstream
  • BZ - 821692 - Migration always failed from rhel6.3 to rhel6.1 host with sound device
  • BZ - 825188 - make scsi-testsuite pass
  • BZ - 827612 - Update qemu-ga to its latest upstream version
  • BZ - 831102 - add the ability to set a wwn for SCSI disks
  • BZ - 831708 - Spice-Server, VM Creation works when a bad value is entered for streaming-video
  • BZ - 833152 - per-machine-type CPU models for safe migration
  • BZ - 833687 - manpage says e1000 is the default nic (default is rtl8139)
  • BZ - 836133 - spice migration: prevent race with libvirt
  • BZ - 839156 - Fedora 16 and 17 guests hang during boot
  • BZ - 839832 - qemu-ga: document selinux policy for read/write of guest files
  • BZ - 839957 - usb-storage: SYNCHRONIZE_CACHE is broken
  • BZ - 846268 - [virtio-win][scsi] Windows guest Core dumped when trying to initialize readonly scsi data disk
  • BZ - 846954 - qemu-img convert segfaults on zeroed image
  • BZ - 849657 - scsi devices see an unit attention condition on migration
  • BZ - 850927 - QMP: two events related issues on S3 wakeup
  • BZ - 852612 - guest hang if query cpu frequently during pxe boot
  • BZ - 852665 - Backport e1000 receive queue fixes from upstream
  • BZ - 852965 - set_link can not change rtl8139 network card's status
  • BZ - 854191 - Add a new boot parameter to set the delay time before rebooting
  • BZ - 854304 - reset PMBA and PMREGMISC PIIX4 registers
  • BZ - 854474 - floppy I/O error after do live migration with floppy in used
  • BZ - 854528 - spice: fix vga mode performance
  • BZ - 856422 - qemu-ga: after reboot of frozen fs, guest-fsfreeze-status is wrong
  • BZ - 856851 - qemu-kvm-rhel6: fix warning that breaks 'make rh-rpms'
  • BZ - 857937 - exit with error if old spice-server is used and '-spice seamless-migration=on' option
  • BZ - 860573 - Live migration from rhel6.3 release version to rhel6.4 newest version with 501MB memory in guest will fail
  • BZ - 861331 - Allow non-seamless migration of vms with usb-redir devices
  • BZ - 865767 - qemu crashed when rhel6.3 64 bit guest reboots
  • BZ - 866736 - [hck][svvp] PCI Hardware Compliance Test for Systems job failed when e1000 is in use
  • BZ - 867983 - qemu-ga: empty reason string for OpenFileFailed error
  • BZ - 869981 - Cross version migration between different host with spice is broken
  • BZ - 870917 - qcow2: Crash when growing large refcount table
  • BZ - 873563 - Guest aborted when boot with vnc and qxl
  • BZ - 874400 - "rdtscp" flag defined on Opteron_G5 model and cann't be exposed to guest
  • BZ - 874574 - VM terminates when changing display configuration during migration
  • BZ - 876534 - [regression] unable to boot from usb-host devices
  • BZ - 877836 - backport virtio-blk data-plane patches
  • BZ - 877901 - qemu-img and qemu-kvm conflict with qemu-img-rhev and qemu-kvm-rhev
  • BZ - 877933 - vga: fix bochs alignment issue
  • BZ - 879559 - spice with non-qxl vga dumps core
  • BZ - 881732 - vdsm: vdsm is stuck in recovery for almost an hour on NFS storage with running vm's when blocking storage from host
  • BZ - 884450 - after change mac address of guest, mouse inside guest can not be used after system_reset in qemu
  • BZ - 885644 - Memory leak and use after free in qxl_render_update_area_unlocked()
  • BZ - 886798 - Guest should get S3/S4 state according to machine type to avoid cross migration issue
  • BZ - 890288 - use set_link to change rtl8139 and e1000 network card's status but fail to make effectively after reboot guest
  • BZ - 894995 - core dump when install windows guest with x-data-plane=on
  • BZ - 895392 - fail to initialize the the data disk specified x-data-plane=on via 'Device Manager' in win7 64bit guest
  • BZ - 896012 - Muted sound volume after migration of VM with Intel HDA sound device over spice session.

CVEs

(none)

References

  • https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/qemu-kvm.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
qemu-kvm-0.12.1.2-2.355.el6.src.rpm SHA-256: cd9a77d01074277ad41cb577a71292aae90159e538ed21563d87bf56acb702ba
x86_64
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586
i386
qemu-guest-agent-0.12.1.2-2.355.el6.i686.rpm SHA-256: 353fcfa06b595503ff5c5d1b9ef8beb01c81a942240a923ce81c32c508c534a1
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.i686.rpm SHA-256: f0b5fbf05641b447bc27fb893b26065bb205a81fbe5584efaba7e6fd2ce99be2

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
qemu-kvm-0.12.1.2-2.355.el6.src.rpm SHA-256: cd9a77d01074277ad41cb577a71292aae90159e538ed21563d87bf56acb702ba
i386
qemu-guest-agent-0.12.1.2-2.355.el6.i686.rpm SHA-256: 353fcfa06b595503ff5c5d1b9ef8beb01c81a942240a923ce81c32c508c534a1
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.i686.rpm SHA-256: f0b5fbf05641b447bc27fb893b26065bb205a81fbe5584efaba7e6fd2ce99be2
x86_64
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586

Red Hat Enterprise Linux Workstation 6

SRPM
qemu-kvm-0.12.1.2-2.355.el6.src.rpm SHA-256: cd9a77d01074277ad41cb577a71292aae90159e538ed21563d87bf56acb702ba
x86_64
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586
i386
qemu-guest-agent-0.12.1.2-2.355.el6.i686.rpm SHA-256: 353fcfa06b595503ff5c5d1b9ef8beb01c81a942240a923ce81c32c508c534a1
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.i686.rpm SHA-256: f0b5fbf05641b447bc27fb893b26065bb205a81fbe5584efaba7e6fd2ce99be2

Red Hat Enterprise Linux Desktop 6

SRPM
qemu-kvm-0.12.1.2-2.355.el6.src.rpm SHA-256: cd9a77d01074277ad41cb577a71292aae90159e538ed21563d87bf56acb702ba
x86_64
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586
i386
qemu-guest-agent-0.12.1.2-2.355.el6.i686.rpm SHA-256: 353fcfa06b595503ff5c5d1b9ef8beb01c81a942240a923ce81c32c508c534a1
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.i686.rpm SHA-256: f0b5fbf05641b447bc27fb893b26065bb205a81fbe5584efaba7e6fd2ce99be2

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
qemu-kvm-0.12.1.2-2.355.el6.src.rpm SHA-256: cd9a77d01074277ad41cb577a71292aae90159e538ed21563d87bf56acb702ba
x86_64
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586

Red Hat Enterprise Linux Server from RHUI 6

SRPM
qemu-kvm-0.12.1.2-2.355.el6.src.rpm SHA-256: cd9a77d01074277ad41cb577a71292aae90159e538ed21563d87bf56acb702ba
x86_64
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586
i386
qemu-guest-agent-0.12.1.2-2.355.el6.i686.rpm SHA-256: 353fcfa06b595503ff5c5d1b9ef8beb01c81a942240a923ce81c32c508c534a1
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.i686.rpm SHA-256: f0b5fbf05641b447bc27fb893b26065bb205a81fbe5584efaba7e6fd2ce99be2

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
qemu-kvm-0.12.1.2-2.355.el6.src.rpm SHA-256: cd9a77d01074277ad41cb577a71292aae90159e538ed21563d87bf56acb702ba
x86_64
qemu-guest-agent-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 64a3a1c985a5dfd3e0a410fb2d831a4fd2a6fb79e9f1f0be5c28ed21a42be22c
qemu-guest-agent-win32-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 217d31b0f17b6726d16a55847bcf94905d10604cd32a6f795879b13710cf765a
qemu-img-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: ce6c32974d6b932994b68464e5faa59d81cc67cc694521355ee4db965070d74a
qemu-kvm-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: c48e0ba5e8672b98d4a99f0daecf98e88e94574a8efde009716f597fd7312a6f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 72a81fdf4004e13adb7e97cb2a126786470b22710349a8942e09efd812c09f75
qemu-kvm-tools-0.12.1.2-2.355.el6.x86_64.rpm SHA-256: 694ba4b7d3e38852e44b10e351c773c2b35615b9ff0a9c4deff94107fe259586
i386
qemu-guest-agent-0.12.1.2-2.355.el6.i686.rpm SHA-256: 353fcfa06b595503ff5c5d1b9ef8beb01c81a942240a923ce81c32c508c534a1
qemu-kvm-debuginfo-0.12.1.2-2.355.el6.i686.rpm SHA-256: f0b5fbf05641b447bc27fb893b26065bb205a81fbe5584efaba7e6fd2ce99be2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility