Skip to navigation

Bug Fix Advisory xen bug fix and enhancement update

Advisory: RHBA-2010:0294-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-03-30
Last updated on: 2010-03-30
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated xen packages that fix several bugs and add enhancements are now
available.

The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.

These updated packages include numerous bug fixes for and enhancements to
the xen packages. Space precludes documenting each of these changes in
this advisory and users are directed to the xen chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technica
l_Notes/xen.html

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which fix the bugs and add the enhancements noted in the Red Hat
Enterprise Linux 5.5 Technical Notes. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-105.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4de7ccac865eac70a1f310a4cb6a51b8
SHA-256: d20223aa9b742a7a6b08a3cfc758ea5fa8b420755ae0f77832057b8c69582e86
 
IA-32:
xen-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8021d14767766b98c8cd7e1edc88f562
SHA-256: 7cf75c34d29dd03ac08edb8d9f1ef08748d74afca8a723553a0f43900dde12aa
xen-devel-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5c6a8d28573e68b4c8784db614401223
SHA-256: 3fb7b5b36e714aafcdaed9836e8972256072d6b9b8352d39c9dfe47acd9025e3
 
x86_64:
xen-3.0.3-105.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0e9fbc2f82336c3760658a01362e75ff
SHA-256: 80670af9b87d566f167a25364b4880cf8baab04c1948dbefbfc3fced44c233a9
xen-devel-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5c6a8d28573e68b4c8784db614401223
SHA-256: 3fb7b5b36e714aafcdaed9836e8972256072d6b9b8352d39c9dfe47acd9025e3
xen-devel-3.0.3-105.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8b2ffe21c1644b60e0f91773995dfb96
SHA-256: 09262d88c5c8a20f3f02e11f4c30fd976f5bc375a96f1a0a26c7067db6040387
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-105.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4de7ccac865eac70a1f310a4cb6a51b8
SHA-256: d20223aa9b742a7a6b08a3cfc758ea5fa8b420755ae0f77832057b8c69582e86
 
IA-32:
xen-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8021d14767766b98c8cd7e1edc88f562
SHA-256: 7cf75c34d29dd03ac08edb8d9f1ef08748d74afca8a723553a0f43900dde12aa
xen-devel-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5c6a8d28573e68b4c8784db614401223
SHA-256: 3fb7b5b36e714aafcdaed9836e8972256072d6b9b8352d39c9dfe47acd9025e3
 
IA-64:
xen-3.0.3-105.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: caced05a03296b67ec4e4284d214b7c9
SHA-256: da9bdcd5a97c24ab00487603fce1b993b0f634f74430908f25eddef5c818a131
xen-devel-3.0.3-105.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: c994b7ef23b9515f8d32e7b0d3d7770b
SHA-256: 46d4c76b143053139b6050e1d778e15297f1ca66814726e93508dce71a6ac803
 
x86_64:
xen-3.0.3-105.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0e9fbc2f82336c3760658a01362e75ff
SHA-256: 80670af9b87d566f167a25364b4880cf8baab04c1948dbefbfc3fced44c233a9
xen-devel-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5c6a8d28573e68b4c8784db614401223
SHA-256: 3fb7b5b36e714aafcdaed9836e8972256072d6b9b8352d39c9dfe47acd9025e3
xen-devel-3.0.3-105.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8b2ffe21c1644b60e0f91773995dfb96
SHA-256: 09262d88c5c8a20f3f02e11f4c30fd976f5bc375a96f1a0a26c7067db6040387
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-105.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4de7ccac865eac70a1f310a4cb6a51b8
SHA-256: d20223aa9b742a7a6b08a3cfc758ea5fa8b420755ae0f77832057b8c69582e86
 
IA-32:
xen-libs-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 03f971cbd3bb0824cbf8844098b21cf1
SHA-256: 5691537e744175d08314bbfded8a6ff8e10c93010d1135a69554ecbf5665a08a
 
IA-64:
xen-libs-3.0.3-105.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 6af56807d6cf906a5a010c7c534a6e89
SHA-256: 6908ca0c28d204d1832d677c5bc5fb09f8d02bf7fbd2a051ca73fc2b198e84ee
 
x86_64:
xen-libs-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 03f971cbd3bb0824cbf8844098b21cf1
SHA-256: 5691537e744175d08314bbfded8a6ff8e10c93010d1135a69554ecbf5665a08a
xen-libs-3.0.3-105.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 9e321775ce9d22ee4d744154522e2868
SHA-256: 236c5d73e7c11a56ad21214595dffa8342fef0b023751266a2dccb95b3aacd80
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-105.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4de7ccac865eac70a1f310a4cb6a51b8
SHA-256: d20223aa9b742a7a6b08a3cfc758ea5fa8b420755ae0f77832057b8c69582e86
 
IA-32:
xen-libs-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 03f971cbd3bb0824cbf8844098b21cf1
SHA-256: 5691537e744175d08314bbfded8a6ff8e10c93010d1135a69554ecbf5665a08a
 
x86_64:
xen-libs-3.0.3-105.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 03f971cbd3bb0824cbf8844098b21cf1
SHA-256: 5691537e744175d08314bbfded8a6ff8e10c93010d1135a69554ecbf5665a08a
xen-libs-3.0.3-105.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 9e321775ce9d22ee4d744154522e2868
SHA-256: 236c5d73e7c11a56ad21214595dffa8342fef0b023751266a2dccb95b3aacd80
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

251666 - Service xendomains output is confusing and ugly
453042 - RFE: [CRM#1806336] Add 'default-vcpus' / 'max-vcpus' style options to Xen
480317 - guest reports repeatedly ATA error
499453 - add manufacturer and product name info to guest SMBIOS
504910 - Command "virsh save <domain> <file>" hang when trying to save a paused domain on xen
513211 - save/restore will reset cpu weight for the domain
513604 - Domain goes missing from xm list when rebooted
514025 - 'xm pci-list' fails on PV guest
514448 - [RHEL5.4 Xen]: Running "xm pci-list-assignable-devices" before modprobing pciback leads to error
515757 - Salvage bug fixes from reverted xen-qemu-aio-scsi.patch
517049 - Implement support in xen domain builder for bzImage lzma and bzip2 compression
518124 - Add grub.conf password protection support to pygrub
521346 - PCI-Paththrough with PCI-Card does not work anymore with RHEL5.4
521799 - rename-restart behavior is broken
522850 - Unable to live-migrate two domUs at the same time
523819 - Block assignment of devices below non-ACS switch
529880 - xm-create incorrectly states a vm is in use, when it isn't
542756 - Backporting MSI-X mask bit acceleration
557446 - Migration not working on some machines after xen-3.0.3-95.el5 disable paused domain save patch



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/