- Issued:
- 2011-01-12
- Updated:
- 2011-01-12
RHBA-2011:0031 - Bug Fix Advisory
Synopsis
xen bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that fix several bugs and add enhancements are now
available.
Description
The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.
These updated packages include numerous bug fixes for and enhancements
to the xen packages. Space precludes documenting each of these changes
in this advisory and users are directed to the Virtualization chapter
in the Red Hat Enterprise Linux 5.6 Technical Notes:
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Release_Notes/ar01s02.html
All Red Hat Enterprise Linux 5 users are advised to install these
updated packages, which fix the bugs and add the enhancements noted in
the Red Hat Enterprise Linux 5.6 Technical Notes. The system must be
rebooted for this update to take effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 416811 - Handle xendomains restore failure gracefully
- BZ - 439279 - Fully-virtualized guests are able to write to read-only disks
- BZ - 443237 - Xen IP antispoofing is not working when multiple antispoof ip addesses are specified
- BZ - 444815 - PVFB's NumLock doesn't stay in sync with host's
- BZ - 486308 - HVM guest stops running when xm save fails
- BZ - 494811 - "migrating-" prefix is not removed from guest's name when migration or xm save fails
- BZ - 495958 - xentop doesn't report vif statistics on bonded interfaces
- BZ - 499616 - virsh erroneously reported successful disk-detach
- BZ - 501026 - 'serial8250: too much work for irq4' message when viewing serial console on SMP full-virtualized xen domU
- BZ - 503290 - long xen domains do not work for storing xen guests during reboot
- BZ - 504278 - xc_save reports success on IA64 although errors are printed to xend.log
- BZ - 509789 - got "received packet with own address as source address" in dom0
- BZ - 511135 - Xen live migrations fail with "Error Internal error .."
- BZ - 513335 - PV guest with VFB device stops running when xm save fails
- BZ - 513431 - PV guest migrations happen even if there is no image file on the destination side.
- BZ - 513537 - 32-bit PV guest on x86_64 host still remains shutdown when 'xm save' failed
- BZ - 514738 - pygrub behaves differently in interactive and non-interactive modes when the default is set to a number that doesn't exist
- BZ - 515238 - Add Qemu disable pci devices patch to support Xen Windows GPLPV drivers
- BZ - 515371 - RFE: Allow interface name definition for xend-relocation-address in /etc/xen/xend-config.sxp
- BZ - 516177 - QEMU AIO for SCSI wanted
- BZ - 520850 - funny error message on detaching nonexistent device
- BZ - 528431 - [mem-set]it should not allow to set the current memory larger than max memory
- BZ - 528448 - [reboot]Sometimes it cannot reboot a domain successfully
- BZ - 529380 - xm man page is inaccurate
- BZ - 532648 - Backport upstream fixes to vbd hotplug
- BZ - 541840 - PV guest hang on boot when VCPU bound to specific CPU
- BZ - 542590 - [RHEL5 Xen]: xm dump-core unpauses a paused guest
- BZ - 544300 - qcow2raw can't open the qcow image
- BZ - 544950 - Trying to save a PV guest with a pci device assigned makes the PV guest hang there
- BZ - 552573 - Formatting a SCSI disk on a Windows Vista 64-bit guest causes Windows to hang
- BZ - 552600 - Fix typo in keymap definitions in Xen
- BZ - 552612 - Caps Lock key in the guest's vnc console does not match the host
- BZ - 556391 - Potential division by zero in NUMA handling
- BZ - 567916 - RHEL5.4-x86_64-PV-guest with a assigned pci device crashed after saved it.
- BZ - 573579 - bonding miimon setting doesn't send gratuitous arp with xen kernel
- BZ - 573768 - Windows Logo testing likes its PCI classes to be consistent
- BZ - 577511 - Grub2 guest support for RHEL5 Xen pygrub
- BZ - 580509 - Give correct memory amount back to dom0 when ballooning fails
- BZ - 580945 - Add HLT instruction emulation to VMXAssist in Xen
- BZ - 586821 - Booting from qcow image not works for hvm
- BZ - 602869 - Live migration broken for HVM (Windows) instances with PV drivers
- BZ - 606919 - Memory leak in xenstore
- BZ - 608072 - updated xm mem-max values not picked up by mem-set, fails with an error
- BZ - 619037 - balloon.free: dom0_alloc should be in KiB
- BZ - 622413 - "xm save" fail for rhel5.5 pv guest on ia64 platform when maxmem > memory
- BZ - 624959 - xend should prevent restarting loops when guest crashes at boot time and dump-core is enabled
- BZ - 626277 - qemu-dm defunct when vif model misspelled
- BZ - 626716 - save a paused PV guest cause start_info page lost
- BZ - 627480 - maxmem preservation after xend restart
- BZ - 628476 - xendomains: fail to rename restore image when restore error occured if mysql-server is not installed
- BZ - 628779 - xendomains: log message mistake when a domain fails to be created
- BZ - 636244 - VMXAssist fixes for Solaris 10 64 bit vm: handle transition from paging-enabled protected mode to real mode + implement additional instructions
- BZ - 639361 - hvm guests fail to save on 32b hosts without pv-on-hvm drivers
- BZ - 645237 - RHEL5.6-Server-i386-xen virsh attach-disk for unexisting cdrom doesn't detect failure
- BZ - 652701 - need to wait for outstanding aio requests before unplugging ide disks
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xen-3.0.3-120.el5.src.rpm | SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32 |
x86_64 | |
xen-3.0.3-120.el5.x86_64.rpm | SHA-256: 01d8f210999c5cf705204345ec6f214b46c228a3dd911b74fe7f192c747b4c38 |
xen-devel-3.0.3-120.el5.i386.rpm | SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9 |
xen-devel-3.0.3-120.el5.x86_64.rpm | SHA-256: 49bc76033bee9ada1ee7d0e64266c547521532bc9f274ae3f11cd993156d7e7d |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
xen-libs-3.0.3-120.el5.x86_64.rpm | SHA-256: 855724437d4dc7ff39ca88dbad602556585e7948e0e570df2b078c1435243ea1 |
ia64 | |
xen-3.0.3-120.el5.ia64.rpm | SHA-256: a8a2a0bfa15d103f1013fe7697f8762a725eff991a2821b006cec7c9c6fb4c01 |
xen-devel-3.0.3-120.el5.ia64.rpm | SHA-256: 49a567e5fb159d463f36a9aa6c88ae2786ff78c7dc109e24e66fd183adc06f3b |
xen-libs-3.0.3-120.el5.ia64.rpm | SHA-256: 83a33fcfd5382258d815f032a4b6b97fcbbf784c72ce9a47ce9217531a0f2db8 |
i386 | |
xen-3.0.3-120.el5.i386.rpm | SHA-256: 55becae4b5291a691067de054be573a83cc56c9b20b12c1652b38f77a9a53710 |
xen-devel-3.0.3-120.el5.i386.rpm | SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9 |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xen-3.0.3-120.el5.src.rpm | SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32 |
x86_64 | |
xen-3.0.3-120.el5.x86_64.rpm | SHA-256: 01d8f210999c5cf705204345ec6f214b46c228a3dd911b74fe7f192c747b4c38 |
xen-devel-3.0.3-120.el5.i386.rpm | SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9 |
xen-devel-3.0.3-120.el5.x86_64.rpm | SHA-256: 49bc76033bee9ada1ee7d0e64266c547521532bc9f274ae3f11cd993156d7e7d |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
xen-libs-3.0.3-120.el5.x86_64.rpm | SHA-256: 855724437d4dc7ff39ca88dbad602556585e7948e0e570df2b078c1435243ea1 |
i386 | |
xen-3.0.3-120.el5.i386.rpm | SHA-256: 55becae4b5291a691067de054be573a83cc56c9b20b12c1652b38f77a9a53710 |
xen-devel-3.0.3-120.el5.i386.rpm | SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9 |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xen-3.0.3-120.el5.src.rpm | SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32 |
x86_64 | |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
xen-libs-3.0.3-120.el5.x86_64.rpm | SHA-256: 855724437d4dc7ff39ca88dbad602556585e7948e0e570df2b078c1435243ea1 |
i386 | |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xen-3.0.3-120.el5.src.rpm | SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32 |
x86_64 | |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
xen-libs-3.0.3-120.el5.x86_64.rpm | SHA-256: 855724437d4dc7ff39ca88dbad602556585e7948e0e570df2b078c1435243ea1 |
i386 | |
xen-libs-3.0.3-120.el5.i386.rpm | SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.