Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2014:1490 - Bug Fix Advisory
Issued:
2014-10-13
Updated:
2014-10-13

RHBA-2014:1490 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

qemu-kvm bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated qemu-kvm packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space
component for running virtual machines using KVM.

This update fixes the following bugs:

  • Repeated creation of virtual machine (VM) image snapshots gradually increases

the string size of the image filename. However, the number of characters in the
filename strings for virtual VM images was previously limited to 1024.
Consequently, when the size limit was reached, creating an image snapshot failed
to be executed or the VM did not successfully boot. With this update, the
filename string size limit has been increased to 4096, and the described
problems only occur with an extremely high amount of snapshots. (BZ#1067576)

  • Vendor-specific SCSI commands issued from a KVM guest did not reach the target

device because QEMU regarded such commands as invalid. This bug has been fixed
and vendor-specific SCSI commands are now properly propagated to the target
device. (BZ#1113917)

  • Previously, the bdrv_is_allocated() function returned "True" for unallocated

sectors. Consequently, when performing live incremental migration, the disk size
was in some cases considerably expanded due to unintended transfer of
unallocated sectors beyond the end of the base image. With this update, the
bdrv_is_allocated() returns "False" for unallocated sectors. As a result, the
disk size no longer changes in the mentioned scenario. (BZ#1092117)

  • When hot unplugging a virtual CPU (vCPU) from a guest using libvirt, the

current Red Hat Enterprise Linux QEMU implementation does not remove the
corresponding vCPU thread. Consequently, libvirt did not detect the vCPU count
correctly after a vCPU was hot unplugged, and it was not possible to hot plug a
vCPU after a hot unplug. In this update, information from QEMU is used to filter
out inactive vCPU threads of disabled vCPUs, which allows libvirt to perform the
hot plug. (BZ#1017858)

  • The "dump-guest-memory" command did not correctly support memory compression,

which caused crash dump files to take up excessive hard drive space. The memory
compression of "dump-guest-memory" has now been fixed, and the crash dump files
now have the expected size. (BZ#1035162)

In addition, this update adds the following enhancements:

  • The ioeventfd mechanism has been enabled in the virtio-scsi-pci controller.

This allows QEMU to process I/O requests outside of the vCPU thread, which
reduces the latency of submitting requests and improves single task throughput.
(BZ#1106420)

  • A new device, virtio-rng, can be configured for guests, which makes the

entropy from the host available to guests. By default, this information is
sourced from the host's /dev/random file, but hardware random number generation
(RNG) available on hosts can be used as the source as well. (BZ#786407)

  • The dump-guest-memory.py script has been introduced into QEMU, which makes it

possible to analyze a guest memory dump from the QEMU-KVM core in case of a
guest kernel failure. (BZ#826266)

  • KVM now supports the use of a virtualized Performance Monitoring Unit (vPMU).

This allows users to run performance monitoring tools on Linux guests, as well
as to perform a live guest migration while using PMU. (BZ#845667)

  • The qemu-img utility is now able to create images in the VHD and VHDX format,

which can be used with the Microsoft Hyper-V hypervisor. (BZ#1006159,
BZ#1097021)

  • The support for version 3 of the Virtual Machine Disk (VMDK) format has been

added to the qemu-img utility. This allows qemu-img to read image info and
convert the format of VMDK3 image files. (BZ#1007708)

Users of qemu-kvm are advised to upgrade to these updated packages, which fix
these bugs and add these enhancement. After installing this update, shut down
all running virtual machines. Once all virtual machines have shut down, start
them again for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386

Fixes

  • BZ - 786407 - [RFE] Add ability to pull system entropy from host
  • BZ - 949547 - qemu-kvm process consumes 8% cpu even when windows guest is idle inside and 70% when guest uses 10% cpu inside
  • BZ - 965396 - turn down tap link off under hmp, rhel6.4 guest boot stalled at "starting certmonger" after “system-reset”
  • BZ - 990254 - qemu-kvm failing when invalid machine type is provided
  • BZ - 994388 - SpiceWorker-CRITICAL **: red_worker.c:4894:red_update_area: condition `area->left >= 0 && area->top >= 0 && area->left < area->right && area->top < area->bottom' failed
  • BZ - 995931 - Qemu core dump (red_get_image: unknown type 184) when reboot a RHEL.6.4-64 guest 25 times
  • BZ - 998426 - there are four "gluster" in qemu-img supported format list
  • BZ - 998865 - Add vlan parameter in device_add command would cause device_add qemu_new_net_client: Assertion `!peer'
  • BZ - 1004420 - Backport qcow2 corruption prevention patches
  • BZ - 1005037 - When using “-vga qxl” together with “-display vnc=:5” or “-display sdl” qemu displays pixel garbage
  • BZ - 1006027 - -mem-prealloc option behaviour is opposite to expected
  • BZ - 1006159 - [RFE] qemu-img: Add/improve support for VHD/VHDX format
  • BZ - 1006650 - qemu should give a more friendly prompt when didn't specify read-only for VHDX format disk
  • BZ - 1007708 - [RFE] Enable qemu-img to support VMDK version 3
  • BZ - 1007712 - host call trace while chang the number of VFs through sysfs with VF in use
  • BZ - 1008755 - should block to do live migration when trying to migrate a VHDX image file
  • BZ - 1008761 - qemu should give a more friendly prompt when didn't specify read-only for VPC format disk
  • BZ - 1010670 - spice session is closed when taking snapshot with ram
  • BZ - 1012244 - make live snapshot with QED disk specified qcow2 format will cause guest hang and host call trace
  • BZ - 1013300 - Guest coredump while boot guest with " MALLOC_PERTURB_=234 ....--vnc :10,acl,sasl -vga qxl"
  • BZ - 1017649 - need to update qmeu-img man help docs page about "VHDX" format disk
  • BZ - 1017858 - [Intel 6.6 Bug] virsh setvcpus can not setup correct vcpu number
  • BZ - 1018434 - qemu-kvm: Could not find keytab file: /etc/qemu/krb5.tab: No such file or directory
  • BZ - 1018451 - 'qemu-img info' take too much time with 'cluster_size=512,preallocation=metadata' in the first time
  • BZ - 1018537 - qemu core dump after run read/randwr fio in guest with usb or scsi disk
  • BZ - 1021575 - Missing SASL support for SPICE
  • BZ - 1022548 - Read/Randread/Randrw performance regression
  • BZ - 1023874 - [Regression] Prompt error of trigger blkdebug: BLKDBG_CLUSTER_FREE event is not the same as expected
  • BZ - 1024335 - Manpage doesn't document -drive rerror/werror/readonly
  • BZ - 1025235 - the readonly permission of floppy will be changed after eject/change
  • BZ - 1026903 - QMP: human-monitor-command: fix buffer duplication
  • BZ - 1027181 - Guest can't receive any character transmitted from host after hot unplugging virtserialport then hot plugging again
  • BZ - 1027561 - Cleanup unused event_idx compat property from rhel6.0.0 and rhel6.1.0 machine types
  • BZ - 1029983 - spice-server reports incorrect listening address on monitor with "ipv6" option
  • BZ - 1031883 - qemu-io error prompt "Operation is supported" is not expected
  • BZ - 1054137 - improve error reporting
  • BZ - 1054753 - qemu-img doesn't print error in json for raw images
  • BZ - 1060024 - QMP socket breaks on unexpected close
  • BZ - 1063559 - VHDX: journal log should not be replayed by default, but rather via qemu-img check -r all
  • BZ - 1064643 - qemu makes no distinction between external and guest triggered block I/O errors
  • BZ - 1067576 - RHEV: Cannot start VMs that have more than 23 snapshots.
  • BZ - 1074396 - QMP: "query-version" doesn't include the -rhev prefix from the qemu-kvm-rhev package
  • BZ - 1074762 - qemu-kvm Segmentation fault when using -no-kvm-irqchip option and virtio-nic-pci device as the same time
  • BZ - 1075139 - multi-monitor doesn't work with a RHEL 7 guest.
  • BZ - 1088610 - qemu-img coredumpd when try to create a gluster format image
  • BZ - 1088788 - qemu-img creates truncated VMDK image with subformat=twoGbMaxExtentFlat
  • BZ - 1092117 - live incremental migration of vm with common shared base, size(disk) > size(base) transfers unallocated sectors, explodes disk on dest
  • BZ - 1095609 - qemu-kvm should give some hint when hot-plug a devices with the same existing "scsi-id and lun"
  • BZ - 1095612 - Machine type rhel6.0.0 & -vga qxl & vnc cause qemu-kvm core dump
  • BZ - 1097021 - [RFE] qemu-img: Add/improve Disk2VHD tools creating VHDX images
  • BZ - 1097031 - Improve posix-aio-compat latency by backporting upstream fix
  • BZ - 1099599 - Some vCPU topologies not accepted by libvirt
  • BZ - 1101430 - qemu-kvm get "Unknown error 1539571707" when execute block-stream
  • BZ - 1101701 - comparison always false at qcow2_refcount.c:613
  • BZ - 1102659 - Use-after-free of file descriptor in create_kdump_vmcore
  • BZ - 1102668 - Return value of virtio_load not checked in virtio_rng_load
  • BZ - 1104573 - DMA error when install RHEL.5.11.x86_64 guest (ide drive) on RHEL6 host
  • BZ - 1105428 - readonly=on has no effect for drive with no media
  • BZ - 1106420 - Enable ioenventfd for virtio-scsi-pci
  • BZ - 1112078 - RHEL7 guest desktop hang when boot with qxl and vnc
  • BZ - 1116558 - Allow qemu-img to bypass the host cache (check, compare, convert, rebase, amend)
  • BZ - 1118543 - Can not continue live commiting when using glusterfs(native) backend after relaunch qemu
  • BZ - 1118718 - VMstate static checker: backport -dump-vmstate feature to export json-encoded vmstate info
  • BZ - 1119207 - [rng]qemu-kvm process still can start when specify negative value for max-bytes
  • BZ - 1120541 - qemu-kvm crashed when doing iofuzz testing
  • BZ - 1122410 - backport qemu-iotests to the RHEL 6 internal repository
  • BZ - 1122885 - qemu-img man doc should tell "should report progress bar when receives "SIGUSR1" signal if -p option is not used"
  • BZ - 1122992 - Full mirroring with smaller backing file causes qemu to hang
  • BZ - 1123698 - qemu-kvm core dump when hot-plug a virtio-scsi disk to guest and reboot
  • BZ - 1124314 - incorrect event reported by QMP on hot plugging an in-use VF to guest
  • BZ - 1124443 - qcow2 doesn't catch invalid header extension sizes
  • BZ - 1125792 - Add vmstate json representation files for RHEL6 releases to source tree

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5

Red Hat Enterprise Linux Workstation 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

Red Hat Enterprise Linux Desktop 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5

Red Hat Enterprise Linux Server from RHUI 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility