Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Application Foundations
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2017:2891 - Bug Fix Advisory
Issued:
2017-10-16
Updated:
2017-10-16

RHBA-2017:2891 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

qemu-kvm-rhev bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated qemu-kvm-rhev packages that fix several bugs are now available for Red Hat Virtualization Hypervisor 7.

Description

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages provide the user-space component for running virtual machines using KVM.

This update fixes the following bugs:

  • Previously, the qemu-kvm service in some cases terminated unexpectedly when starting the Input/Output Memory Management Unit (IOMMU) feature. This update ensures that all active conections are released in the proper order when starting IOMMU. As a result, the back end no longer attempts to handle requests after the connections are released, which prevents the problem from occurring. (BZ#1480446)
  • Prior to this update, sending the BREAK or PAUSE keys over the VNC or SPICE client was not properly handled and had no effect in the guest. This update adds proper key handlers for these keys, so they trigger appropriate events in the guest. In addition, sending keys for controlling guest audio over VNC or SPICE now works as expected. (BZ#1482388, BZ#1482389)
  • Hot-unplugging Virtual Function I/O (VFIO) devices previously failed when performed after hot-unplugging a vhost network device. This update fixes the underlying code, and the VFIO device is unplugged correctly in the described circumstances. (BZ#1490742)

Users of qemu-kvm are advised to upgrade to these updated packages, which fix these bugs. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization 3 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
  • Red Hat Virtualization for IBM Power LE 3 ppc64le

Fixes

  • BZ - 1480446 - vhost-user/iommu: crash when backend disconnects [rhel-7.4.z]
  • BZ - 1482388 - Keys to control audio are not forwarded to the guest [rhel-7.4.z]
  • BZ - 1482389 - Unable to send PAUSE/BREAK to guests in VNC or SPICE [rhel-7.4.z]
  • BZ - 1490742 - Hot-unplugging a vhost network device leaks references to VFIOPCIDevice's [rhel-7.4.z]

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10
x86_64
qemu-img-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: 5c63c3736a5c46705d91c6a14cd4401d79606fc8a6944fd51dc703a818cca20c
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: 4cec0ace466f0ad6085c487692357e076129fa754cd881691e302712a2be15f1
qemu-kvm-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: 3cfc6640e03802ec0c2438fae6f18ab10c032c3ce93a69c5e540a4b06f5c9d99
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: b02f078bbba084b11acbe77ba8fad3c7c5c0c7c071e337ac63c1088724e97255
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: c91f1614e8ada9c0cbb132d188175874c52bb29046c8534f1c6272bdc2b5aadb

Red Hat Virtualization 3 for RHEL 7

SRPM
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10
x86_64
qemu-img-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: 5c63c3736a5c46705d91c6a14cd4401d79606fc8a6944fd51dc703a818cca20c
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: 4cec0ace466f0ad6085c487692357e076129fa754cd881691e302712a2be15f1
qemu-kvm-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: 3cfc6640e03802ec0c2438fae6f18ab10c032c3ce93a69c5e540a4b06f5c9d99
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: b02f078bbba084b11acbe77ba8fad3c7c5c0c7c071e337ac63c1088724e97255
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.x86_64.rpm SHA-256: c91f1614e8ada9c0cbb132d188175874c52bb29046c8534f1c6272bdc2b5aadb

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10
ppc64le
qemu-img-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: f5f59c486698f542834d09c7306337f5e60a4d8dc487c264659aa4b5c48b3f28
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 02abc0707b8806a5f16a5c5ca57d8d2f5389d1165aa7dba20fdb48690d0c1774
qemu-kvm-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 4ac5784c31c13a1493917363647a130654819bc6c2f68e52d63e3453fb41c259
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 9f97b67ad1d43aaaa1934f97d64fe21d042003717cfe9b2e30413ec8d9a55b04
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 7c9c28050128f422027d7310faed691d571b26e9579edc443a63ee00968da786

Red Hat Virtualization for IBM Power LE 3

SRPM
qemu-kvm-rhev-2.9.0-16.el7_4.8.src.rpm SHA-256: d74755cd84af974587069ff9a16846788532bfcc46b374946f5e5da2cccc3c10
ppc64le
qemu-img-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: f5f59c486698f542834d09c7306337f5e60a4d8dc487c264659aa4b5c48b3f28
qemu-kvm-common-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 02abc0707b8806a5f16a5c5ca57d8d2f5389d1165aa7dba20fdb48690d0c1774
qemu-kvm-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 4ac5784c31c13a1493917363647a130654819bc6c2f68e52d63e3453fb41c259
qemu-kvm-rhev-debuginfo-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 9f97b67ad1d43aaaa1934f97d64fe21d042003717cfe9b2e30413ec8d9a55b04
qemu-kvm-tools-rhev-2.9.0-16.el7_4.8.ppc64le.rpm SHA-256: 7c9c28050128f422027d7310faed691d571b26e9579edc443a63ee00968da786

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Policy effective July 1st, 2023.
Red Hat Summit
Twitter