Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHBA-2014:1490 - Bug Fix Advisory
Issued:
2014-10-13
Updated:
2014-10-13

RHBA-2014:1490 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

qemu-kvm bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated qemu-kvm packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space
component for running virtual machines using KVM.

This update fixes the following bugs:

  • Repeated creation of virtual machine (VM) image snapshots gradually increases

the string size of the image filename. However, the number of characters in the
filename strings for virtual VM images was previously limited to 1024.
Consequently, when the size limit was reached, creating an image snapshot failed
to be executed or the VM did not successfully boot. With this update, the
filename string size limit has been increased to 4096, and the described
problems only occur with an extremely high amount of snapshots. (BZ#1067576)

  • Vendor-specific SCSI commands issued from a KVM guest did not reach the target

device because QEMU regarded such commands as invalid. This bug has been fixed
and vendor-specific SCSI commands are now properly propagated to the target
device. (BZ#1113917)

  • Previously, the bdrv_is_allocated() function returned "True" for unallocated

sectors. Consequently, when performing live incremental migration, the disk size
was in some cases considerably expanded due to unintended transfer of
unallocated sectors beyond the end of the base image. With this update, the
bdrv_is_allocated() returns "False" for unallocated sectors. As a result, the
disk size no longer changes in the mentioned scenario. (BZ#1092117)

  • When hot unplugging a virtual CPU (vCPU) from a guest using libvirt, the

current Red Hat Enterprise Linux QEMU implementation does not remove the
corresponding vCPU thread. Consequently, libvirt did not detect the vCPU count
correctly after a vCPU was hot unplugged, and it was not possible to hot plug a
vCPU after a hot unplug. In this update, information from QEMU is used to filter
out inactive vCPU threads of disabled vCPUs, which allows libvirt to perform the
hot plug. (BZ#1017858)

  • The "dump-guest-memory" command did not correctly support memory compression,

which caused crash dump files to take up excessive hard drive space. The memory
compression of "dump-guest-memory" has now been fixed, and the crash dump files
now have the expected size. (BZ#1035162)

In addition, this update adds the following enhancements:

  • The ioeventfd mechanism has been enabled in the virtio-scsi-pci controller.

This allows QEMU to process I/O requests outside of the vCPU thread, which
reduces the latency of submitting requests and improves single task throughput.
(BZ#1106420)

  • A new device, virtio-rng, can be configured for guests, which makes the

entropy from the host available to guests. By default, this information is
sourced from the host's /dev/random file, but hardware random number generation
(RNG) available on hosts can be used as the source as well. (BZ#786407)

  • The dump-guest-memory.py script has been introduced into QEMU, which makes it

possible to analyze a guest memory dump from the QEMU-KVM core in case of a
guest kernel failure. (BZ#826266)

  • KVM now supports the use of a virtualized Performance Monitoring Unit (vPMU).

This allows users to run performance monitoring tools on Linux guests, as well
as to perform a live guest migration while using PMU. (BZ#845667)

  • The qemu-img utility is now able to create images in the VHD and VHDX format,

which can be used with the Microsoft Hyper-V hypervisor. (BZ#1006159,
BZ#1097021)

  • The support for version 3 of the Virtual Machine Disk (VMDK) format has been

added to the qemu-img utility. This allows qemu-img to read image info and
convert the format of VMDK3 image files. (BZ#1007708)

Users of qemu-kvm are advised to upgrade to these updated packages, which fix
these bugs and add these enhancement. After installing this update, shut down
all running virtual machines. Once all virtual machines have shut down, start
them again for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 x86_64

Fixes

  • BZ - 786407 - [RFE] Add ability to pull system entropy from host
  • BZ - 949547 - qemu-kvm process consumes 8% cpu even when windows guest is idle inside and 70% when guest uses 10% cpu inside
  • BZ - 965396 - turn down tap link off under hmp, rhel6.4 guest boot stalled at "starting certmonger" after “system-reset”
  • BZ - 990254 - qemu-kvm failing when invalid machine type is provided
  • BZ - 994388 - SpiceWorker-CRITICAL **: red_worker.c:4894:red_update_area: condition `area->left >= 0 && area->top >= 0 && area->left < area->right && area->top < area->bottom' failed
  • BZ - 995931 - Qemu core dump (red_get_image: unknown type 184) when reboot a RHEL.6.4-64 guest 25 times
  • BZ - 998426 - there are four "gluster" in qemu-img supported format list
  • BZ - 998865 - Add vlan parameter in device_add command would cause device_add qemu_new_net_client: Assertion `!peer'
  • BZ - 1004420 - Backport qcow2 corruption prevention patches
  • BZ - 1005037 - When using “-vga qxl” together with “-display vnc=:5” or “-display sdl” qemu displays pixel garbage
  • BZ - 1006027 - -mem-prealloc option behaviour is opposite to expected
  • BZ - 1006159 - [RFE] qemu-img: Add/improve support for VHD/VHDX format
  • BZ - 1006650 - qemu should give a more friendly prompt when didn't specify read-only for VHDX format disk
  • BZ - 1007708 - [RFE] Enable qemu-img to support VMDK version 3
  • BZ - 1007712 - host call trace while chang the number of VFs through sysfs with VF in use
  • BZ - 1008755 - should block to do live migration when trying to migrate a VHDX image file
  • BZ - 1008761 - qemu should give a more friendly prompt when didn't specify read-only for VPC format disk
  • BZ - 1010670 - spice session is closed when taking snapshot with ram
  • BZ - 1012244 - make live snapshot with QED disk specified qcow2 format will cause guest hang and host call trace
  • BZ - 1013300 - Guest coredump while boot guest with " MALLOC_PERTURB_=234 ....--vnc :10,acl,sasl -vga qxl"
  • BZ - 1017649 - need to update qmeu-img man help docs page about "VHDX" format disk
  • BZ - 1017858 - [Intel 6.6 Bug] virsh setvcpus can not setup correct vcpu number
  • BZ - 1018434 - qemu-kvm: Could not find keytab file: /etc/qemu/krb5.tab: No such file or directory
  • BZ - 1018451 - 'qemu-img info' take too much time with 'cluster_size=512,preallocation=metadata' in the first time
  • BZ - 1018537 - qemu core dump after run read/randwr fio in guest with usb or scsi disk
  • BZ - 1021575 - Missing SASL support for SPICE
  • BZ - 1022548 - Read/Randread/Randrw performance regression
  • BZ - 1023874 - [Regression] Prompt error of trigger blkdebug: BLKDBG_CLUSTER_FREE event is not the same as expected
  • BZ - 1024335 - Manpage doesn't document -drive rerror/werror/readonly
  • BZ - 1025235 - the readonly permission of floppy will be changed after eject/change
  • BZ - 1026903 - QMP: human-monitor-command: fix buffer duplication
  • BZ - 1027181 - Guest can't receive any character transmitted from host after hot unplugging virtserialport then hot plugging again
  • BZ - 1027561 - Cleanup unused event_idx compat property from rhel6.0.0 and rhel6.1.0 machine types
  • BZ - 1029983 - spice-server reports incorrect listening address on monitor with "ipv6" option
  • BZ - 1031883 - qemu-io error prompt "Operation is supported" is not expected
  • BZ - 1054137 - improve error reporting
  • BZ - 1054753 - qemu-img doesn't print error in json for raw images
  • BZ - 1060024 - QMP socket breaks on unexpected close
  • BZ - 1063559 - VHDX: journal log should not be replayed by default, but rather via qemu-img check -r all
  • BZ - 1064643 - qemu makes no distinction between external and guest triggered block I/O errors
  • BZ - 1067576 - RHEV: Cannot start VMs that have more than 23 snapshots.
  • BZ - 1074396 - QMP: "query-version" doesn't include the -rhev prefix from the qemu-kvm-rhev package
  • BZ - 1074762 - qemu-kvm Segmentation fault when using -no-kvm-irqchip option and virtio-nic-pci device as the same time
  • BZ - 1075139 - multi-monitor doesn't work with a RHEL 7 guest.
  • BZ - 1088610 - qemu-img coredumpd when try to create a gluster format image
  • BZ - 1088788 - qemu-img creates truncated VMDK image with subformat=twoGbMaxExtentFlat
  • BZ - 1092117 - live incremental migration of vm with common shared base, size(disk) > size(base) transfers unallocated sectors, explodes disk on dest
  • BZ - 1095609 - qemu-kvm should give some hint when hot-plug a devices with the same existing "scsi-id and lun"
  • BZ - 1095612 - Machine type rhel6.0.0 & -vga qxl & vnc cause qemu-kvm core dump
  • BZ - 1097021 - [RFE] qemu-img: Add/improve Disk2VHD tools creating VHDX images
  • BZ - 1097031 - Improve posix-aio-compat latency by backporting upstream fix
  • BZ - 1099599 - Some vCPU topologies not accepted by libvirt
  • BZ - 1101430 - qemu-kvm get "Unknown error 1539571707" when execute block-stream
  • BZ - 1101701 - comparison always false at qcow2_refcount.c:613
  • BZ - 1102659 - Use-after-free of file descriptor in create_kdump_vmcore
  • BZ - 1102668 - Return value of virtio_load not checked in virtio_rng_load
  • BZ - 1104573 - DMA error when install RHEL.5.11.x86_64 guest (ide drive) on RHEL6 host
  • BZ - 1105428 - readonly=on has no effect for drive with no media
  • BZ - 1106420 - Enable ioenventfd for virtio-scsi-pci
  • BZ - 1112078 - RHEL7 guest desktop hang when boot with qxl and vnc
  • BZ - 1116558 - Allow qemu-img to bypass the host cache (check, compare, convert, rebase, amend)
  • BZ - 1118543 - Can not continue live commiting when using glusterfs(native) backend after relaunch qemu
  • BZ - 1118718 - VMstate static checker: backport -dump-vmstate feature to export json-encoded vmstate info
  • BZ - 1119207 - [rng]qemu-kvm process still can start when specify negative value for max-bytes
  • BZ - 1120541 - qemu-kvm crashed when doing iofuzz testing
  • BZ - 1122410 - backport qemu-iotests to the RHEL 6 internal repository
  • BZ - 1122885 - qemu-img man doc should tell "should report progress bar when receives "SIGUSR1" signal if -p option is not used"
  • BZ - 1122992 - Full mirroring with smaller backing file causes qemu to hang
  • BZ - 1123698 - qemu-kvm core dump when hot-plug a virtio-scsi disk to guest and reboot
  • BZ - 1124314 - incorrect event reported by QMP on hot plugging an in-use VF to guest
  • BZ - 1124443 - qcow2 doesn't catch invalid header extension sizes
  • BZ - 1125792 - Add vmstate json representation files for RHEL6 releases to source tree

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5

Red Hat Enterprise Linux Workstation 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

Red Hat Enterprise Linux Desktop 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5

Red Hat Enterprise Linux Server from RHUI 6

SRPM
qemu-kvm-0.12.1.2-2.445.el6.src.rpm SHA-256: f21a38f092e20e85f8121484666586f982a0f9c5dba4c9f459bc6d0e7e338b32
x86_64
qemu-guest-agent-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: d50b26fe67e5616f91646e8c2d63aea09be5284282d68c5eeecf6ddbd4b709e0
qemu-img-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 8257a4c749f0a0ae8cabb5fa31141ca9b7a445f6797b47a4f149dc4bd0f8c626
qemu-kvm-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 9dc48c20bbd786c3e8d240609581ee943d54511d88f399a0c479f92cfeb81455
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 17e47a52d7df2db0582717f66eddf1a656f7f48a7fb1273220c5056882ca8b66
qemu-kvm-tools-0.12.1.2-2.445.el6.x86_64.rpm SHA-256: 16ed41b9157038efb3a48b36f704f3807cc5528044299bb1b7dec669f25840b5
i386
qemu-guest-agent-0.12.1.2-2.445.el6.i686.rpm SHA-256: 18cf7fc8a2c16160a73d1ac161a8bd4896d8817986c98351fe8931642763b7f1
qemu-kvm-debuginfo-0.12.1.2-2.445.el6.i686.rpm SHA-256: 21ce801128051f662fd64b0abb4fdbff853174e74fc90155dcd0b845996ba5e1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter