- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHBA-2011:1070 - Bug Fix Advisory
Synopsis
xen bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that fix various bugs and add several enhancements are now
available for Red Hat Enterprise Linux 5.
Description
The xen packages contain administration tools and the xend service for managing
the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.
These updated xen packages include a number of bug fixes and enhancements. Space
precludes documenting all of these changes in this advisory. Refer to the Red
Hat Enterprise Linux 5.7 Technical Notes for information about these changes:
All users of xen are advised to upgrade to these updated packages, which provide
numerous bug fixes and an enhancement. The system must be rebooted for this
update to take effect.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 593339 - xenconsoled dies randomly and makes it impossible to create new guests
- BZ - 605956 - Need a command to switch ISO image of CDROM device of guest.
- BZ - 625368 - xend should give warning message to prevent creating when guest vcpus >32 on ia64 platform
- BZ - 626806 - [RHEL 5.5] 32-bit pvhvm guest on 64-bit host crash w/xm mem-set
- BZ - 627551 - SCSI inquiry error message in rhel6 guest when there is qemu emulated scsi disk
- BZ - 630814 - Can not use mouse in hvm guest when using "sdl" display method
- BZ - 637351 - xend should check device_model before really creating the HVM guest
- BZ - 641541 - "xentop" show no changes after "xm rename" changes the domain name
- BZ - 651710 - xmdomain.cfg man page mistake: on_shutdown
- BZ - 651912 - BSOD 0x101 or hang for Windows guests running with emulated IDE devices
- BZ - 652150 - Restart xend causes losing running guest after crash with "on_crash=rename-restart"
- BZ - 652310 - xen hvmloader: fix off-by-one-bit error when initializing PCI devices
- BZ - 657187 - Output message is a little confused when starting xendomains with invalid image
- BZ - 658712 - xend: Add syntax check for block devices
- BZ - 661277 - hotplug: check image file existence
- BZ - 663933 - tap device is assigned a random MAC address that can interrupt bridge connectivity
- BZ - 665011 - backport various fixes for memory leaks
- BZ - 665017 - lost double clicks on slow connections
- BZ - 665032 - NIC unplug in qemu-dm will also unplug passthrough NICs
- BZ - 668365 - domain info isn't cleared in xenstore after destroy
- BZ - 668747 - PV guest stuck after start
- BZ - 669388 - bogus do_FLR call in XendDomain.py
- BZ - 671337 - Unable to restart domain on crash with on_crash="rename-restart"
- BZ - 672224 - Domain reboot failed when two disks attached
- BZ - 673456 - Zombie-RHEL-pv-guest appears after save/restore PV guest to an insufficient partition and destroy the guest.
- BZ - 674516 - xenctx shows nonsensical values for 32-on-64 and HVM domains
- BZ - 674763 - Cannot start hvm guest with empty cdrom
- BZ - 675733 - Debian 6.0 within a DomU, RHEL5.6 as Dom0
- BZ - 679138 - Update domctl.h to kernel version
- BZ - 679280 - Domain creation failed when previous domains have lots of vbds
- BZ - 680407 - xm block-attach fails to attach more than ~20 images
- BZ - 682101 - failed to save windows guests
- BZ - 683437 - backport xz compression for domU kernel images
- BZ - 684700 - peth0: received packet with own address as source address
- BZ - 688162 - failure to create domains on NUMA machines?
- BZ - 690760 - Error message in Xend log when block device hot detach with a PV guest
- BZ - 692034 - xvda disk inaccessible when installing from hdc device
- BZ - 702248 - SVVP's job SMBIOS can not pass if guest memory is bigger or equal 32G
CVEs
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xen-3.0.3-132.el5.src.rpm | SHA-256: f4402e7678892739218c63c3f30f4cc8f5953133cbb7eca78becfa3f43ce86e5 |
x86_64 | |
xen-3.0.3-132.el5.x86_64.rpm | SHA-256: 3e6a86b56dac78b8bf2474d5a0bcd3516b70a02154a940e7388e0bd4412ad011 |
xen-devel-3.0.3-132.el5.i386.rpm | SHA-256: 1550761deff03c3d5361a56fd87994de887ab8d0d53dbb699128124ffe4e8460 |
xen-devel-3.0.3-132.el5.x86_64.rpm | SHA-256: 53f6cc577bf980206b87d99c994ce88a1a31b149833060a084cd10c9a35435c6 |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
xen-libs-3.0.3-132.el5.x86_64.rpm | SHA-256: 513b107421c4af45cfeae8dd01347d7f6d771de6b6e26dc22fe9e31730b08c7d |
ia64 | |
xen-3.0.3-132.el5.ia64.rpm | SHA-256: 60ff6e7d86b35b4741b8ebcf8546bbcc3c51aae37eafe6a7deac6c833a074eb8 |
xen-devel-3.0.3-132.el5.ia64.rpm | SHA-256: 2d6cceb370efd3bf9a14fa386aefc8569c1aabd9554f51fe23a3d58cbc8d0b19 |
xen-libs-3.0.3-132.el5.ia64.rpm | SHA-256: f73336b9fe2c0940a725bd49b73a62f8737c99456ce7e1cda2ff1876530eb3fe |
i386 | |
xen-3.0.3-132.el5.i386.rpm | SHA-256: 7edaa8cd8841716a1e7f1715f023b070a8c55f633b0868f4485d1d8d386838f9 |
xen-devel-3.0.3-132.el5.i386.rpm | SHA-256: 1550761deff03c3d5361a56fd87994de887ab8d0d53dbb699128124ffe4e8460 |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xen-3.0.3-132.el5.src.rpm | SHA-256: f4402e7678892739218c63c3f30f4cc8f5953133cbb7eca78becfa3f43ce86e5 |
x86_64 | |
xen-3.0.3-132.el5.x86_64.rpm | SHA-256: 3e6a86b56dac78b8bf2474d5a0bcd3516b70a02154a940e7388e0bd4412ad011 |
xen-devel-3.0.3-132.el5.i386.rpm | SHA-256: 1550761deff03c3d5361a56fd87994de887ab8d0d53dbb699128124ffe4e8460 |
xen-devel-3.0.3-132.el5.x86_64.rpm | SHA-256: 53f6cc577bf980206b87d99c994ce88a1a31b149833060a084cd10c9a35435c6 |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
xen-libs-3.0.3-132.el5.x86_64.rpm | SHA-256: 513b107421c4af45cfeae8dd01347d7f6d771de6b6e26dc22fe9e31730b08c7d |
i386 | |
xen-3.0.3-132.el5.i386.rpm | SHA-256: 7edaa8cd8841716a1e7f1715f023b070a8c55f633b0868f4485d1d8d386838f9 |
xen-devel-3.0.3-132.el5.i386.rpm | SHA-256: 1550761deff03c3d5361a56fd87994de887ab8d0d53dbb699128124ffe4e8460 |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xen-3.0.3-132.el5.src.rpm | SHA-256: f4402e7678892739218c63c3f30f4cc8f5953133cbb7eca78becfa3f43ce86e5 |
x86_64 | |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
xen-libs-3.0.3-132.el5.x86_64.rpm | SHA-256: 513b107421c4af45cfeae8dd01347d7f6d771de6b6e26dc22fe9e31730b08c7d |
i386 | |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xen-3.0.3-132.el5.src.rpm | SHA-256: f4402e7678892739218c63c3f30f4cc8f5953133cbb7eca78becfa3f43ce86e5 |
x86_64 | |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
xen-libs-3.0.3-132.el5.x86_64.rpm | SHA-256: 513b107421c4af45cfeae8dd01347d7f6d771de6b6e26dc22fe9e31730b08c7d |
i386 | |
xen-libs-3.0.3-132.el5.i386.rpm | SHA-256: c8c68c7e868b9444d2d98af60e8fd364047f7fa2f1fae1afdfa1c1acd6c686d2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.