Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1328 - Bug Fix Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHBA-2009:1328 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

xen bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated xen packages that fix several bugs and add enhancements are now
available.

Description

The xen packages contain tools for managing the virtual machine monitor in
Red Hat Enterprise Linux Virtualization.

These updated packages fix the following bugs:

  • fix CPUs pinning in guest's configuration after save/restore sequence

(BZ#228890)

  • kernel command line could not be edited in IA64 PV guests during boot

(BZ#249791)

  • disallow migration for domains with attached PCI devices (BZ#334821)
  • give memory back to dom0 if autoballooning failed (BZ#345271)
  • credit scheduler parameters were not preserved during guest restart

(BZ#345321)

  • exclusively used devices could be attached to more than one guest at a

time (BZ#345441)

  • allow HVM guests creation under tight memory conditions (BZ#419771)
  • migration of PV guests could hang on failure (BZ#428691)
  • xend and xendomains init scripts returned wrong exit codes (BZ#430904)
  • vfb and vkbd entries were not removed from xenstore after destroying a

guest (BZ#439182)

  • saving a guest reported success even if the operation failed (BZ#451675)
  • the "xm console" documentation was updated to mention Ctrl-] sequence

which escapes from xenconsole (BZ#454611)

  • creating a guest could fail under heavy I/O in dom0 (BZ#456926)
  • serialize iptables calls in hotplug scripts (BZ#460410)
  • HVM guests suffered from missing clock interrupts (BZ#465116)
  • P-V guests could not be rebooted after restarting xend

(BZ#468971,BZ#474579)

  • Xen network-bridge script didn't work when source address was specified

for default route (BZ#475249)

  • passing out-of-range identification of an IDE disk caused a guest to

misbehave or crash (BZ#475433)

  • bogus MAC address was allowed to be specified for a virtual NIC

(BZ#476611)

  • data corruption occurred on guests with virtual SCSI disks larger than

1TB (BZ#479339)

  • HVM guests suffered from time skews (BZ#480689)
  • avoid SCSI device data corruptions on HVM guests with >4GB RAM

(BZ#480843)

  • flush Xen SCSI driver buffer to disk before returning from

scsi_write_data() function (BZ#481782)

  • correctly handle device detach attempts for devices mounted in guest

(BZ#484110)

  • "xm dump-core" didn't truncate existing files (BZ#484346)
  • QCOW images were created with wrong byte order (BZ#485471)
  • P-V guest didn't resume after failed save or migration (BZ#486157)
  • xenconsole didn't work after failed save or migration (BZ#486291)
  • QCOW images couldn't be used with PV guests or HVM guests with PV drivers

(BZ#486353)

  • xend didn't stop in runlevels 0, 1, and 6 (BZ#490053)
  • libxenstore would leak memory on every @domainIntroduced event

(BZ#490158)

  • boot first entry in guest's grub.conf if default boot configuration is

invalid (BZ#490754)

  • pygrub would ignore "default" and "timeout" options in elilo.conf

(BZ#491408)

  • bridged network didn't work well when used together with bonding and

802.1q VLANs (BZ#492258)

These updated packages add the following enhancements:

  • support for F11 and F12 keys in HVM BIOS (BZ#338321)
  • support for Ctrk-Alt-Del in HVM BIOS (BZ#338331)
  • support for global default keymap setting (BZ#345251)
  • support for save, restore, migration and dump-core of 32b guests on a 64b

host (BZ#425411, BZ#480118)

  • support for attaching PCI devices to HVM guests using VT-d (BZ#480520)
  • support for virtual SCSI disks larger than 2TB (BZ#482780)
  • support for local migrations (BZ#484967)
  • support for 1GB host page tables (BZ#487342)
  • support for relative mouse offset VNC extension (BZ#487559)
  • support for INT13 LBA48 extensions in HVM BIOS (BZ#487907)
  • fix PCIe NICs on Stoakley detach problem (BZ#507179)
  • fix guest reboot with VT-d device assigned (BZ#507182)
  • add BDFs duplicate check in HVM configure file (BZ#507195)
  • fix MSI-X NIC hotplug removal (BZ#507198)
  • fix `xm pci-list` BDF output on WeyBridge platform (BZ#507257)
  • set cpu_weight default value back to 256 (BZ#508680)

Users of xen are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 228890 - Pinned CPUs of guests are unpinned after save/restore sequence
  • BZ - 334821 - [RHEL 5.2] Xen 3.1.1 Prevent migration with attached PCI devices
  • BZ - 338321 - [RHEL 5.2] Xen 3.1.1 Add F11/F12 key support to hvm bios
  • BZ - 338331 - [RHEL 5.2] Xen 3.1.1 Add ctrl-alt-del reboot to hvm bios
  • BZ - 345251 - [RHEL 5.2] Xen 3.1.1: Add default keymap option to config.sxp
  • BZ - 345271 - [RHEL 5.2] Xen 3.1.1: Give memory back to dom0 after failed autoballoon
  • BZ - 345321 - [RHEL 5.2] Xen 3.1.1: Fix sched params to stick on reboot and be accurate in xm list
  • BZ - 345441 - [RHEL 5.2] Xen 3.1.1: Add vbd and vif duplication checks
  • BZ - 419771 - Creating full virt domain fails showing 'cannot allocate memory'
  • BZ - 425411 - [RHEL5.2]: i386 PV guests on x86_64 HV fail "xm save"
  • BZ - 430904 - [RHEL5]: xend and xendomains init scripts have wrong return values
  • BZ - 439182 - [RHEL5.2]: Running "xm destroy" on a domain with PVFB causes a xenstore leak
  • BZ - 454611 - [man] Ctrl+] not documented for xenconsole
  • BZ - 456926 - virt-install with 8GB of ram aborts after it creates the storage file.
  • BZ - 460410 - xm create fails to add vif PHYSDEV match rules for a domU with multiple network interfaces
  • BZ - 465116 - Formatting a disk on a Windows Server 2008/Vista 32 guest causes Windows to panic.
  • BZ - 468971 - Xen domain cannot be rebooted after restarting xend
  • BZ - 474579 - Xen domain cannot be rebooted after restarting xend if it is configured with a mixture of tap and vbd disks
  • BZ - 475249 - xen network-bridge script doesn't work with SRCADDR option in default route interface
  • BZ - 475433 - When out of range hdX values are attached, guests misbehave/crash
  • BZ - 476611 - xm network-attach allow bogus mac addresses to be entered
  • BZ - 480118 - [RHEL5 Xen]: xm dump-core with 32-on-64 PV guest fails
  • BZ - 480689 - SMP 32bit RHEL5u1 and RHEL5u2 HVM domain might stop booting when start udev service
  • BZ - 480843 - SCSI problems on fullvirt guests with > 4Gb mem
  • BZ - 481354 - typo in python2.4/site-packages/xen/xend/sxp.py
  • BZ - 481782 - scsi backend: make sure data is actually written to disk
  • BZ - 482780 - FEAT: support virtual SCSI disks >2TB
  • BZ - 484110 - Unable to shut down guest after attempting block-detach of guest boot device
  • BZ - 484346 - xm dump-core does not truncate existing files
  • BZ - 485471 - blktap qcow driver uses incompatible endianess vs qemu's qcow driver
  • BZ - 486157 - PV guest stops running when xm save fails
  • BZ - 486291 - xm console does not work when xm save fails
  • BZ - 486353 - Fix missing blktap poll-on-aio support
  • BZ - 487559 - RFE: Xen QEMU VNC server needs to support relative mouse VNC extension
  • BZ - 487907 - Patch to provide INT13 LBA48 extensions to Xen HVM BIOS (boot off disks/images larger than 128GB)
  • BZ - 490053 - xen doesn't stop when entering runlevels 0, 1, or 6.
  • BZ - 490158 - libxenstore.so leaks memory on every @domainIntroduced event
  • BZ - 490754 - pygrub abort with IndexError if default is set higher than number of boot entries
  • BZ - 492258 - network-bridge-bonding doesn't support 802.1q vlans
  • BZ - 507765 - XenD looses PVFB config info after PV guest reboot
  • BZ - 508680 - default value of cpu_weight changed from 256 to 1
  • BZ - 514733 - [Regression] xen HVM fsync performance for file-backed fs is in the toilet

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-3.0.3-94.el5.x86_64.rpm SHA-256: 1af8c3b96f2a12d331ba61b2738ea052b30529a466aae81eaccd1a758c75cf7e
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-devel-3.0.3-94.el5.x86_64.rpm SHA-256: c6aad0dfca2809c0bb162bb795acf17936aac6cb50c58f2f1f9d1749fbf6805b
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
ia64
xen-3.0.3-94.el5.ia64.rpm SHA-256: 6186dd1a08c456990b39f192d6a8dc9f4cff08e5a7352cba5b1eeda0930db9ce
xen-devel-3.0.3-94.el5.ia64.rpm SHA-256: b7f7eaa3211b7ec0ed3b696147ba569d7ff18df36535f579078e6b8cef2e152b
xen-libs-3.0.3-94.el5.ia64.rpm SHA-256: 4515953765484f36a3faa8160e785ffdb597c7e549823badf38af1f69fc21d83
i386
xen-3.0.3-94.el5.i386.rpm SHA-256: 8e2c6ecce54f56fa91c7b0c1c68ed707cb028c8c28bcb3ba17ac31da7e938f7a
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

Red Hat Enterprise Linux Workstation 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-3.0.3-94.el5.x86_64.rpm SHA-256: 1af8c3b96f2a12d331ba61b2738ea052b30529a466aae81eaccd1a758c75cf7e
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-devel-3.0.3-94.el5.x86_64.rpm SHA-256: c6aad0dfca2809c0bb162bb795acf17936aac6cb50c58f2f1f9d1749fbf6805b
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
i386
xen-3.0.3-94.el5.i386.rpm SHA-256: 8e2c6ecce54f56fa91c7b0c1c68ed707cb028c8c28bcb3ba17ac31da7e938f7a
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

Red Hat Enterprise Linux Desktop 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
i386
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

Red Hat Enterprise Linux Server from RHUI 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
i386
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility