- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0118 - Bug Fix Advisory
Synopsis
xen bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that fix several bugs and add enhancements are now
available.
Description
Xen is a high performance and secure open source virtualization framework.
Virtualization allows users to run many guest virtual machines on top of a
host operating system.
This erratum includes the following bug fixes and enhancements:
- Rotate all log files periodically
- Fix overflow in qemu-img
- Fix race in DMA thread
- Fix blktap data access alignment
- Do not unpause domain after taking core
- Persist device model PID across restarts
- Pass internal libxc return value back to caller
- Fix passing of domid to libxc from python IOport & IRQ controllers
- Do not try to balloon more than physical RAM
- Add blktap sub-type checks
- Respect nographics request for HVM
- Put xenstored database on tmpfs
- Prefer grub.conf in pygrub
- Do not throw errors when listing domain
- Add mouse wheel support to PVFB
Users of Xen are advised to upgrade to these updated packages, which
include these bug fixes and enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 234486 - pygrub tries to read menu.lst before grub.conf, tries to start non-existent kernel
- BZ - 238833 - Error: Device 0 not connected
- BZ - 249292 - qemu-dm segfaulting for fully-vritualized guest
- BZ - 253884 - xen tools - blktap outputs unaligned access error
- BZ - 337651 - network-bridge do not work with vlan interfaces
- BZ - 344861 - No ethernet controller driver on windows 2003 server of IA64 platform
- BZ - 422271 - Drop in support for logrotate
- BZ - 426861 - timer stops running after live migrate or dom0 reboot & save/restore of a Xen guest
- BZ - 429154 - bonding + arp monitoring + xen cause interface flapping
- BZ - 437086 - xen: buffer overflow detected: qcow-create terminated
- BZ - 440274 - Network-attach command mismatches the usage.
- BZ - 442077 - Using sdaa as a guest device results in corupted device name inside the guest
- BZ - 442698 - 'xm dump-core --crash' does not stop guest domain in time
- BZ - 444413 - Cannot use attach disk if subdriver option is wrong in blktap
- BZ - 445476 - Unable to create a PV guest with > 3 disks
- BZ - 446089 - xend / xenstored performance & scalability issues
- BZ - 456392 - Xen Support more than 16 disk devices (userland)
- BZ - 457199 - RHEL5.3 xen: include support for booting Fedora 10 DomU (i.e. bzImage support)
- BZ - 462702 - xenstored fails to start because selinux prevents access to files on tmpfs
- BZ - 462727 - Problems occur when executing 'xm reboot' on the second time.
- BZ - 473882 - [RHEL5.3]: xm block-detach no longer works
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xen-3.0.3-80.el5.src.rpm | SHA-256: 19132b7d466fd16fcb646a01ac454d72b18e737b7c5993ac356ba9cca63714a2 |
x86_64 | |
xen-3.0.3-80.el5.x86_64.rpm | SHA-256: 7ef60c67e648e9dcc322870da4a620f27913670d30dc55c3e82bac263d84ab35 |
xen-devel-3.0.3-80.el5.i386.rpm | SHA-256: 6870c82afd52808390155e18608eadfc88ff16cef3aef0d960f1c37fd2570c2e |
xen-devel-3.0.3-80.el5.x86_64.rpm | SHA-256: a599a0649d2444a5e9e689ee34177b971351e5b1289ba1eb77db4a495bed5448 |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
xen-libs-3.0.3-80.el5.x86_64.rpm | SHA-256: a1df72ac00b93ae1057aa760f7a74dc81150616a6c6f864c6ad968a41280b1f9 |
ia64 | |
xen-3.0.3-80.el5.ia64.rpm | SHA-256: 64688f35b5fa04adef1321db9f20adb698ee45fa57ee4fe7097cbd552dfbc11b |
xen-devel-3.0.3-80.el5.ia64.rpm | SHA-256: 12fa1b6e6acfbc25b75c9317b469460b37e368c3e4c89b07414929d0895b75bc |
xen-libs-3.0.3-80.el5.ia64.rpm | SHA-256: e4992549443fcd60548f97b2a9ca8675fb2c0081fc6234a06c93d6d6d4fe35da |
i386 | |
xen-3.0.3-80.el5.i386.rpm | SHA-256: 4a028cd2b90fd745bd15e3f170274272673a8c3cd83aab81d11b22e0373407dd |
xen-devel-3.0.3-80.el5.i386.rpm | SHA-256: 6870c82afd52808390155e18608eadfc88ff16cef3aef0d960f1c37fd2570c2e |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xen-3.0.3-80.el5.src.rpm | SHA-256: 19132b7d466fd16fcb646a01ac454d72b18e737b7c5993ac356ba9cca63714a2 |
x86_64 | |
xen-3.0.3-80.el5.x86_64.rpm | SHA-256: 7ef60c67e648e9dcc322870da4a620f27913670d30dc55c3e82bac263d84ab35 |
xen-devel-3.0.3-80.el5.i386.rpm | SHA-256: 6870c82afd52808390155e18608eadfc88ff16cef3aef0d960f1c37fd2570c2e |
xen-devel-3.0.3-80.el5.x86_64.rpm | SHA-256: a599a0649d2444a5e9e689ee34177b971351e5b1289ba1eb77db4a495bed5448 |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
xen-libs-3.0.3-80.el5.x86_64.rpm | SHA-256: a1df72ac00b93ae1057aa760f7a74dc81150616a6c6f864c6ad968a41280b1f9 |
i386 | |
xen-3.0.3-80.el5.i386.rpm | SHA-256: 4a028cd2b90fd745bd15e3f170274272673a8c3cd83aab81d11b22e0373407dd |
xen-devel-3.0.3-80.el5.i386.rpm | SHA-256: 6870c82afd52808390155e18608eadfc88ff16cef3aef0d960f1c37fd2570c2e |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xen-3.0.3-80.el5.src.rpm | SHA-256: 19132b7d466fd16fcb646a01ac454d72b18e737b7c5993ac356ba9cca63714a2 |
x86_64 | |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
xen-libs-3.0.3-80.el5.x86_64.rpm | SHA-256: a1df72ac00b93ae1057aa760f7a74dc81150616a6c6f864c6ad968a41280b1f9 |
i386 | |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xen-3.0.3-80.el5.src.rpm | SHA-256: 19132b7d466fd16fcb646a01ac454d72b18e737b7c5993ac356ba9cca63714a2 |
x86_64 | |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
xen-libs-3.0.3-80.el5.x86_64.rpm | SHA-256: a1df72ac00b93ae1057aa760f7a74dc81150616a6c6f864c6ad968a41280b1f9 |
i386 | |
xen-libs-3.0.3-80.el5.i386.rpm | SHA-256: 0b5d0f4329d1161541cd187911f4845141f3a50b165f4ad5c94414cf0d54ba4a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.