Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHBA-2009:1328 - Bug Fix Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHBA-2009:1328 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

xen bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated xen packages that fix several bugs and add enhancements are now
available.

Description

The xen packages contain tools for managing the virtual machine monitor in
Red Hat Enterprise Linux Virtualization.

These updated packages fix the following bugs:

  • fix CPUs pinning in guest's configuration after save/restore sequence

(BZ#228890)

  • kernel command line could not be edited in IA64 PV guests during boot

(BZ#249791)

  • disallow migration for domains with attached PCI devices (BZ#334821)
  • give memory back to dom0 if autoballooning failed (BZ#345271)
  • credit scheduler parameters were not preserved during guest restart

(BZ#345321)

  • exclusively used devices could be attached to more than one guest at a

time (BZ#345441)

  • allow HVM guests creation under tight memory conditions (BZ#419771)
  • migration of PV guests could hang on failure (BZ#428691)
  • xend and xendomains init scripts returned wrong exit codes (BZ#430904)
  • vfb and vkbd entries were not removed from xenstore after destroying a

guest (BZ#439182)

  • saving a guest reported success even if the operation failed (BZ#451675)
  • the "xm console" documentation was updated to mention Ctrl-] sequence

which escapes from xenconsole (BZ#454611)

  • creating a guest could fail under heavy I/O in dom0 (BZ#456926)
  • serialize iptables calls in hotplug scripts (BZ#460410)
  • HVM guests suffered from missing clock interrupts (BZ#465116)
  • P-V guests could not be rebooted after restarting xend

(BZ#468971,BZ#474579)

  • Xen network-bridge script didn't work when source address was specified

for default route (BZ#475249)

  • passing out-of-range identification of an IDE disk caused a guest to

misbehave or crash (BZ#475433)

  • bogus MAC address was allowed to be specified for a virtual NIC

(BZ#476611)

  • data corruption occurred on guests with virtual SCSI disks larger than

1TB (BZ#479339)

  • HVM guests suffered from time skews (BZ#480689)
  • avoid SCSI device data corruptions on HVM guests with >4GB RAM

(BZ#480843)

  • flush Xen SCSI driver buffer to disk before returning from

scsi_write_data() function (BZ#481782)

  • correctly handle device detach attempts for devices mounted in guest

(BZ#484110)

  • "xm dump-core" didn't truncate existing files (BZ#484346)
  • QCOW images were created with wrong byte order (BZ#485471)
  • P-V guest didn't resume after failed save or migration (BZ#486157)
  • xenconsole didn't work after failed save or migration (BZ#486291)
  • QCOW images couldn't be used with PV guests or HVM guests with PV drivers

(BZ#486353)

  • xend didn't stop in runlevels 0, 1, and 6 (BZ#490053)
  • libxenstore would leak memory on every @domainIntroduced event

(BZ#490158)

  • boot first entry in guest's grub.conf if default boot configuration is

invalid (BZ#490754)

  • pygrub would ignore "default" and "timeout" options in elilo.conf

(BZ#491408)

  • bridged network didn't work well when used together with bonding and

802.1q VLANs (BZ#492258)

These updated packages add the following enhancements:

  • support for F11 and F12 keys in HVM BIOS (BZ#338321)
  • support for Ctrk-Alt-Del in HVM BIOS (BZ#338331)
  • support for global default keymap setting (BZ#345251)
  • support for save, restore, migration and dump-core of 32b guests on a 64b

host (BZ#425411, BZ#480118)

  • support for attaching PCI devices to HVM guests using VT-d (BZ#480520)
  • support for virtual SCSI disks larger than 2TB (BZ#482780)
  • support for local migrations (BZ#484967)
  • support for 1GB host page tables (BZ#487342)
  • support for relative mouse offset VNC extension (BZ#487559)
  • support for INT13 LBA48 extensions in HVM BIOS (BZ#487907)
  • fix PCIe NICs on Stoakley detach problem (BZ#507179)
  • fix guest reboot with VT-d device assigned (BZ#507182)
  • add BDFs duplicate check in HVM configure file (BZ#507195)
  • fix MSI-X NIC hotplug removal (BZ#507198)
  • fix `xm pci-list` BDF output on WeyBridge platform (BZ#507257)
  • set cpu_weight default value back to 256 (BZ#508680)

Users of xen are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 228890 - Pinned CPUs of guests are unpinned after save/restore sequence
  • BZ - 334821 - [RHEL 5.2] Xen 3.1.1 Prevent migration with attached PCI devices
  • BZ - 338321 - [RHEL 5.2] Xen 3.1.1 Add F11/F12 key support to hvm bios
  • BZ - 338331 - [RHEL 5.2] Xen 3.1.1 Add ctrl-alt-del reboot to hvm bios
  • BZ - 345251 - [RHEL 5.2] Xen 3.1.1: Add default keymap option to config.sxp
  • BZ - 345271 - [RHEL 5.2] Xen 3.1.1: Give memory back to dom0 after failed autoballoon
  • BZ - 345321 - [RHEL 5.2] Xen 3.1.1: Fix sched params to stick on reboot and be accurate in xm list
  • BZ - 345441 - [RHEL 5.2] Xen 3.1.1: Add vbd and vif duplication checks
  • BZ - 419771 - Creating full virt domain fails showing 'cannot allocate memory'
  • BZ - 425411 - [RHEL5.2]: i386 PV guests on x86_64 HV fail "xm save"
  • BZ - 430904 - [RHEL5]: xend and xendomains init scripts have wrong return values
  • BZ - 439182 - [RHEL5.2]: Running "xm destroy" on a domain with PVFB causes a xenstore leak
  • BZ - 454611 - [man] Ctrl+] not documented for xenconsole
  • BZ - 456926 - virt-install with 8GB of ram aborts after it creates the storage file.
  • BZ - 460410 - xm create fails to add vif PHYSDEV match rules for a domU with multiple network interfaces
  • BZ - 465116 - Formatting a disk on a Windows Server 2008/Vista 32 guest causes Windows to panic.
  • BZ - 468971 - Xen domain cannot be rebooted after restarting xend
  • BZ - 474579 - Xen domain cannot be rebooted after restarting xend if it is configured with a mixture of tap and vbd disks
  • BZ - 475249 - xen network-bridge script doesn't work with SRCADDR option in default route interface
  • BZ - 475433 - When out of range hdX values are attached, guests misbehave/crash
  • BZ - 476611 - xm network-attach allow bogus mac addresses to be entered
  • BZ - 480118 - [RHEL5 Xen]: xm dump-core with 32-on-64 PV guest fails
  • BZ - 480689 - SMP 32bit RHEL5u1 and RHEL5u2 HVM domain might stop booting when start udev service
  • BZ - 480843 - SCSI problems on fullvirt guests with > 4Gb mem
  • BZ - 481354 - typo in python2.4/site-packages/xen/xend/sxp.py
  • BZ - 481782 - scsi backend: make sure data is actually written to disk
  • BZ - 482780 - FEAT: support virtual SCSI disks >2TB
  • BZ - 484110 - Unable to shut down guest after attempting block-detach of guest boot device
  • BZ - 484346 - xm dump-core does not truncate existing files
  • BZ - 485471 - blktap qcow driver uses incompatible endianess vs qemu's qcow driver
  • BZ - 486157 - PV guest stops running when xm save fails
  • BZ - 486291 - xm console does not work when xm save fails
  • BZ - 486353 - Fix missing blktap poll-on-aio support
  • BZ - 487559 - RFE: Xen QEMU VNC server needs to support relative mouse VNC extension
  • BZ - 487907 - Patch to provide INT13 LBA48 extensions to Xen HVM BIOS (boot off disks/images larger than 128GB)
  • BZ - 490053 - xen doesn't stop when entering runlevels 0, 1, or 6.
  • BZ - 490158 - libxenstore.so leaks memory on every @domainIntroduced event
  • BZ - 490754 - pygrub abort with IndexError if default is set higher than number of boot entries
  • BZ - 492258 - network-bridge-bonding doesn't support 802.1q vlans
  • BZ - 507765 - XenD looses PVFB config info after PV guest reboot
  • BZ - 508680 - default value of cpu_weight changed from 256 to 1
  • BZ - 514733 - [Regression] xen HVM fsync performance for file-backed fs is in the toilet

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-3.0.3-94.el5.x86_64.rpm SHA-256: 1af8c3b96f2a12d331ba61b2738ea052b30529a466aae81eaccd1a758c75cf7e
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-devel-3.0.3-94.el5.x86_64.rpm SHA-256: c6aad0dfca2809c0bb162bb795acf17936aac6cb50c58f2f1f9d1749fbf6805b
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
ia64
xen-3.0.3-94.el5.ia64.rpm SHA-256: 6186dd1a08c456990b39f192d6a8dc9f4cff08e5a7352cba5b1eeda0930db9ce
xen-devel-3.0.3-94.el5.ia64.rpm SHA-256: b7f7eaa3211b7ec0ed3b696147ba569d7ff18df36535f579078e6b8cef2e152b
xen-libs-3.0.3-94.el5.ia64.rpm SHA-256: 4515953765484f36a3faa8160e785ffdb597c7e549823badf38af1f69fc21d83
i386
xen-3.0.3-94.el5.i386.rpm SHA-256: 8e2c6ecce54f56fa91c7b0c1c68ed707cb028c8c28bcb3ba17ac31da7e938f7a
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

Red Hat Enterprise Linux Workstation 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-3.0.3-94.el5.x86_64.rpm SHA-256: 1af8c3b96f2a12d331ba61b2738ea052b30529a466aae81eaccd1a758c75cf7e
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-devel-3.0.3-94.el5.x86_64.rpm SHA-256: c6aad0dfca2809c0bb162bb795acf17936aac6cb50c58f2f1f9d1749fbf6805b
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
i386
xen-3.0.3-94.el5.i386.rpm SHA-256: 8e2c6ecce54f56fa91c7b0c1c68ed707cb028c8c28bcb3ba17ac31da7e938f7a
xen-devel-3.0.3-94.el5.i386.rpm SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

Red Hat Enterprise Linux Desktop 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
i386
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

Red Hat Enterprise Linux Server from RHUI 5

SRPM
xen-3.0.3-94.el5.src.rpm SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce
x86_64
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07
xen-libs-3.0.3-94.el5.x86_64.rpm SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711
i386
xen-libs-3.0.3-94.el5.i386.rpm SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter