Skip to navigation

Bug Fix Advisory xen bug fix update

Advisory: RHBA-2010:0418-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-05-18
Last updated on: 2010-05-18
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated xen package that changes some PCI device classes, ensuring the
Storage Query Property test (part of the Windows Logo test) are passed, is
now available.

Xen is a high performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.

These updated xen packages fix the following bug:

* previously, some para-virtualized drivers returned a STORAGE_BUS_TYPE
(SCSI in this case) that was inconsistent with its PCI class code. They,
consequently, failed the Storage Query Property test (part of the Windows
Logo test). With this update, these drivers' class and sub-class were
changed from "Unclassified" and "Other" to "Storage" and "SCSI"
respectively. This is consistent with their STORAGE_BUS_TYPE and they now
pass the Storage Query Property test. (BZ#580398)

All Xen users, particularly those running guest instances of Windows,
should install this update, which addresses this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.2.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4a92174da93bbd47c64481f681075514
SHA-256: 21b56968b236727e85828549082e2baba6512ca5b9304f80e243e6d19ada1784
 
IA-32:
xen-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0f1174b38383b01a77278b0d9f289987
SHA-256: 26feb730595d8e60754169956f0693b966f690649cbca907c598a6d31cd84d3a
xen-devel-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3680d1dde276fd155ead7203508fed30
SHA-256: e39582e5b9d00a523331aafc1ab7ce247114055152b71345bd51e1220fc13059
 
x86_64:
xen-3.0.3-105.el5_5.2.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8a5f6aa274adbe7057fd6153113cac85
SHA-256: 7bbd143e3853e265f46bad866a92c2a2399f52409dffc3043379185e6c867f19
xen-devel-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3680d1dde276fd155ead7203508fed30
SHA-256: e39582e5b9d00a523331aafc1ab7ce247114055152b71345bd51e1220fc13059
xen-devel-3.0.3-105.el5_5.2.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4b0a3d1edc96613a962a9ebc94ac70c2
SHA-256: 39ff89c933d5fcbc8167422749ffab951c1a9e95c2ffd986f3d4a0024fbfee87
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.2.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4a92174da93bbd47c64481f681075514
SHA-256: 21b56968b236727e85828549082e2baba6512ca5b9304f80e243e6d19ada1784
 
IA-32:
xen-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0f1174b38383b01a77278b0d9f289987
SHA-256: 26feb730595d8e60754169956f0693b966f690649cbca907c598a6d31cd84d3a
xen-devel-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3680d1dde276fd155ead7203508fed30
SHA-256: e39582e5b9d00a523331aafc1ab7ce247114055152b71345bd51e1220fc13059
 
IA-64:
xen-3.0.3-105.el5_5.2.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 075478368907eca0ce0c8c03e7cadbdc
SHA-256: 63c1358742c25914e892cca9e6117e92e0c3fef29b876154cc4b720f912b055a
xen-devel-3.0.3-105.el5_5.2.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: c1ed847a0c5a6f56c2d1ecfb32ac030a
SHA-256: 3a4d8a170fface7ed02af6043d91f14b3b65445a01580a3dd47de0e80737afc1
 
x86_64:
xen-3.0.3-105.el5_5.2.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8a5f6aa274adbe7057fd6153113cac85
SHA-256: 7bbd143e3853e265f46bad866a92c2a2399f52409dffc3043379185e6c867f19
xen-devel-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3680d1dde276fd155ead7203508fed30
SHA-256: e39582e5b9d00a523331aafc1ab7ce247114055152b71345bd51e1220fc13059
xen-devel-3.0.3-105.el5_5.2.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4b0a3d1edc96613a962a9ebc94ac70c2
SHA-256: 39ff89c933d5fcbc8167422749ffab951c1a9e95c2ffd986f3d4a0024fbfee87
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.2.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4a92174da93bbd47c64481f681075514
SHA-256: 21b56968b236727e85828549082e2baba6512ca5b9304f80e243e6d19ada1784
 
IA-32:
xen-libs-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 44cfcda0f087a658c8751574ea4bb33c
SHA-256: 429deb323342ca49a4223285a9979dedc36639cd0eb910e4f6c4a1bb036aa24a
 
IA-64:
xen-libs-3.0.3-105.el5_5.2.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 84857b66ba899969cbc72ff46143aca3
SHA-256: 3e6ba78652c372ebd41a144a8dcf31ea4e9a5f8fe69f4616de3e76a53b93377a
 
x86_64:
xen-libs-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 44cfcda0f087a658c8751574ea4bb33c
SHA-256: 429deb323342ca49a4223285a9979dedc36639cd0eb910e4f6c4a1bb036aa24a
xen-libs-3.0.3-105.el5_5.2.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8a986a46bb2589baed9cdb81b48ab055
SHA-256: 579de743cacc2a720d0d151bf5d9da1122d0831de23eb59a661e89e5452d2b9d
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.2.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 4a92174da93bbd47c64481f681075514
SHA-256: 21b56968b236727e85828549082e2baba6512ca5b9304f80e243e6d19ada1784
 
IA-32:
xen-libs-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 44cfcda0f087a658c8751574ea4bb33c
SHA-256: 429deb323342ca49a4223285a9979dedc36639cd0eb910e4f6c4a1bb036aa24a
 
x86_64:
xen-libs-3.0.3-105.el5_5.2.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 44cfcda0f087a658c8751574ea4bb33c
SHA-256: 429deb323342ca49a4223285a9979dedc36639cd0eb910e4f6c4a1bb036aa24a
xen-libs-3.0.3-105.el5_5.2.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8a986a46bb2589baed9cdb81b48ab055
SHA-256: 579de743cacc2a720d0d151bf5d9da1122d0831de23eb59a661e89e5452d2b9d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

580398 - Windows Logo testing likes its PCI classes to be consistent



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/