Skip to navigation

Bug Fix Advisory xen bug fix update

Advisory: RHBA-2010:0010-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-01-06
Last updated on: 2010-01-06
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
RHEL Virtualization EUS (v. 5.4.z server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.4.z server)

Details

Updated xen packages that close a memory leak in xend are now available.

Xen is a high-performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.

These updated xen packages fix the following bug:

* following a guest shutdown, attempting to recreate that guest may have
failed due to timing issues, which caused the xend daemon to think that the
guest name was still in use, even though it was not. Also, the "xm list"
command (correctly) did not show the name of the guest which had shut down.
As a temporary workaround, running the "xm list" command once would rectify
this situation so that the guest with the same name as the one which had
been shut down could be recreated. This update resolves this issue so that
a guest with the same name as a guest which has recently been shut down can
be recreated immediately, without having to run an interim command.
(BZ#547289)

Xen users are advised to upgrade to these updated packages, which resolve
this issue. Note: after installation, the xend service must be restarted
for this update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

IA-32:
xen-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: f0e2fb068d704b4989bc09de50909d6b
xen-devel-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: e39be54379e90183913645b4ed22a154
 
x86_64:
xen-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: d6925ce2654dd5e1083fcb2386fe795a
xen-devel-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: e39be54379e90183913645b4ed22a154
xen-devel-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 76c0b01193f9800066e5354e78d6cfe7
 
RHEL Virtualization (v. 5 server)

IA-32:
xen-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: f0e2fb068d704b4989bc09de50909d6b
xen-devel-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: e39be54379e90183913645b4ed22a154
 
IA-64:
xen-3.0.3-94.el5_4.3.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0482715f905ffcc70f2be240dca0a50a
xen-devel-3.0.3-94.el5_4.3.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: e45a0b4feada5d2c71e63484791c8f97
 
x86_64:
xen-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: d6925ce2654dd5e1083fcb2386fe795a
xen-devel-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: e39be54379e90183913645b4ed22a154
xen-devel-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 76c0b01193f9800066e5354e78d6cfe7
 
RHEL Virtualization EUS (v. 5.4.z server)

IA-32:
xen-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2011:0326
    MD5: f0e2fb068d704b4989bc09de50909d6b
xen-devel-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2011:0326
    MD5: e39be54379e90183913645b4ed22a154
 
IA-64:
xen-3.0.3-94.el5_4.3.ia64.rpm
File outdated by:  RHBA-2011:0326
    MD5: 0482715f905ffcc70f2be240dca0a50a
xen-devel-3.0.3-94.el5_4.3.ia64.rpm
File outdated by:  RHBA-2011:0326
    MD5: e45a0b4feada5d2c71e63484791c8f97
 
x86_64:
xen-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2011:0326
    MD5: d6925ce2654dd5e1083fcb2386fe795a
xen-devel-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2011:0326
    MD5: e39be54379e90183913645b4ed22a154
xen-devel-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2011:0326
    MD5: 76c0b01193f9800066e5354e78d6cfe7
 
Red Hat Enterprise Linux (v. 5 server)

IA-32:
xen-libs-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1ff211cd5cac69a94fdbba00259b926e
 
IA-64:
xen-libs-3.0.3-94.el5_4.3.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8a2814d598f9ee3974c8811a09df7b97
 
x86_64:
xen-libs-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1ff211cd5cac69a94fdbba00259b926e
xen-libs-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 6a70937e8acc44bbc0f1297d53d69264
 
Red Hat Enterprise Linux Desktop (v. 5 client)

IA-32:
xen-libs-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1ff211cd5cac69a94fdbba00259b926e
 
x86_64:
xen-libs-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1ff211cd5cac69a94fdbba00259b926e
xen-libs-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 6a70937e8acc44bbc0f1297d53d69264
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

IA-32:
xen-libs-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2011:0326
    MD5: 1ff211cd5cac69a94fdbba00259b926e
 
IA-64:
xen-libs-3.0.3-94.el5_4.3.ia64.rpm
File outdated by:  RHBA-2011:0326
    MD5: 8a2814d598f9ee3974c8811a09df7b97
 
x86_64:
xen-libs-3.0.3-94.el5_4.3.i386.rpm
File outdated by:  RHBA-2011:0326
    MD5: 1ff211cd5cac69a94fdbba00259b926e
xen-libs-3.0.3-94.el5_4.3.x86_64.rpm
File outdated by:  RHBA-2011:0326
    MD5: 6a70937e8acc44bbc0f1297d53d69264
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

547289 - xm-create incorrectly states a vm is in use, when it isn't



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/