- Issued:
- 2016-04-04
- Updated:
- 2016-04-04
RHBA-2016:0587 - Bug Fix Advisory
Synopsis
qemu-kvm-rhev bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated qemu-kvm-rhev packages that fix several bugs are now available for Red Hat Enterprise Virtualization Hypervisor 7.
Description
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages provide the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
This update fixes the following bugs:
- Previously, if the drmgr command was used in the guest to hot plug a device before a device_add command was issued via the QEMU monitor, QEMU terminated unexpectedly with a segmentation fault. This update fixes the handling of drmgr so that in the described circumstances, an error is properly raised and QEMU does not crash. (BZ#1306343)
- Using a vhost-net device in a guest running on a NUMA host in some cases prevented the guest from obtaining a dynamic IP address. This update ensures that regions with different file handlers cannot be merged, which allows vhost-net devices to work properly. (BZ#1315197)
- Prior to this update, the QEMU socket queue for the vhost-user device in some cases became full due to leaks of descriptors. This update fixes the handling of region merging so that no descriptors are leaked and the memory is released as expected. (BZ#1315198)
- Previously, suspending a multiqueue vhost-user guest sometimes caused all queues except the first one to stop working after resuming the guest, as QEMU did not expect additional queues to be present. With this update, additional queues are properly handled and work after resuming the guest. (BZ#1316156)
Users of qemu-kvm-rhev are advised to upgrade to these updated packages, which fix these bugs. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 3 ppc64le
Fixes
- BZ - 1306343 - drmgr with invalid value in guest crashes qemu [7.2.z]
- BZ - 1315197 - vhost-user interface cannot get ip if host is a numa machine
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
qemu-kvm-rhev-2.3.0-31.el7_2.10.src.rpm | SHA-256: 867002e0996d1c6f22cf2c71009ded71a8ac54335be3d62906939ff421b4e6f1 |
x86_64 | |
libcacard-devel-rhev-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: ceb51f07fe12367a5bbf6bf9f27ef913e8e7ea1f8d0d79754e3e232b28d09951 |
libcacard-rhev-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: 5c926fea2af32c7743587988aa4cf968789699297743500810a0e61858159ae0 |
libcacard-tools-rhev-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: bddb5aaf25e1119b05a1684d21b69562533e3c9c2f3f250d70079e67d64d60c2 |
qemu-img-rhev-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: 0e10908ba6eb73c2dd3c6bce3d9a565bd88430abe0f3993adec084803835ce2d |
qemu-kvm-common-rhev-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: 20fd46c5d81509b7c8ea716a4c33f718a8cd83fea9cfeecdd2c2bb6cf762e882 |
qemu-kvm-rhev-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: 14399982b692e46f15efb7bd507be32befa62eaf4b199698eebe18d853987742 |
qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: 1d256a58bd121e415a0e6d071e924c8228a68c846b69ed7220a70234e40506a6 |
qemu-kvm-tools-rhev-2.3.0-31.el7_2.10.x86_64.rpm | SHA-256: 7957b47fe18126bb12de6449f35c3e7b34559e9b487140459463ea3d1947869c |
Red Hat Virtualization for IBM Power LE 3
SRPM | |
---|---|
qemu-kvm-rhev-2.3.0-31.el7_2.10.src.rpm | SHA-256: 867002e0996d1c6f22cf2c71009ded71a8ac54335be3d62906939ff421b4e6f1 |
ppc64le | |
libcacard-devel-rhev-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: 52d1d981fb7a84d38ba78dfe8d221aa52767ba756823700a47dc73324fac15ed |
libcacard-rhev-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: c18789b466c34fe6596b61d4a89bd837709e096824393b03abd466998aa8ac63 |
libcacard-tools-rhev-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: 231769e2b2b430927e09fd688e551660ebeffd0499c527c2f9e94aaeceab990e |
qemu-img-rhev-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: 9684b67ca950975990173daadd6785b6b3a03ae17e9f363c961442771ff13ba9 |
qemu-kvm-common-rhev-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: 9276099d052e078b9801934bceca756ab982965e5a158928cdb3021e4cd72499 |
qemu-kvm-rhev-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: d99ca2fd61181da45f9572a649c135143873ca8470a07a11289de10eef568668 |
qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: b89beeff995c0eec53b8a4ef63b5a8e9ec627b676c6e5513e1f038bfbaaf77ef |
qemu-kvm-tools-rhev-2.3.0-31.el7_2.10.ppc64le.rpm | SHA-256: 3ea40140ba880c874ae1e07df084f660381274adde3de2405b721d226d7eeb99 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.