Skip to navigation

Bug Fix Advisory xen bug fix update

Advisory: RHBA-2010:0456-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-06-07
Last updated on: 2010-06-07
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated xen package that fixes a problem with broadcast packets not
travelling from dom0 to domU instances is now available.

Xen is a high performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.

These updated xen packages fix the following bug:

* when the xen bridge ran on an arp-monitored bond device, the local
routing table did not properly flush IP addresses. Consequently, broadcast
packets sent from dom0 were not received by domUs running on the same
system. With this update the routing table is cleaned up properly and
packets from dom0 are received by domU instances as expected. (BZ#592219)

All Xen users, particularly those running guest instances of Windows,
should install this update, which addresses this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.3.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 2739101121c1881eaca6f6c3280617d3
SHA-256: ee541ccb1f2af83c563551406496b7e672bd80e7041c661a530b661e27f188eb
 
IA-32:
xen-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 642ecd170a8bf9e0b1ccbb2693171126
SHA-256: ec7249b031847fbfaa67a80d832b434f81faaf48dcf40aa76f982f823ef42a2c
xen-devel-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1b069d56050278617b6008b2e3a5f5c2
SHA-256: ac9faa3398c6a8767b68c5a44acbfa80a55b43c989e7690ee79db6ad3d340610
 
x86_64:
xen-3.0.3-105.el5_5.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 15f965ccd7d30c63c902c1c8fdc133b9
SHA-256: 59762f4a05ff60b17e815e2d70e7d230a5d26aa689fb6f370acbba52d22bd405
xen-devel-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1b069d56050278617b6008b2e3a5f5c2
SHA-256: ac9faa3398c6a8767b68c5a44acbfa80a55b43c989e7690ee79db6ad3d340610
xen-devel-3.0.3-105.el5_5.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: dd6ccea4d53cc5fc498827feb04e41d6
SHA-256: a4c8c95ed8664760ed18c3c2d013dbbf1e13b426dd8c98eab3f8de7e251e9332
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.3.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 2739101121c1881eaca6f6c3280617d3
SHA-256: ee541ccb1f2af83c563551406496b7e672bd80e7041c661a530b661e27f188eb
 
IA-32:
xen-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 642ecd170a8bf9e0b1ccbb2693171126
SHA-256: ec7249b031847fbfaa67a80d832b434f81faaf48dcf40aa76f982f823ef42a2c
xen-devel-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1b069d56050278617b6008b2e3a5f5c2
SHA-256: ac9faa3398c6a8767b68c5a44acbfa80a55b43c989e7690ee79db6ad3d340610
 
IA-64:
xen-3.0.3-105.el5_5.3.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3f432f82306aea8b29a7072c83c26fbd
SHA-256: f7d9a6cf31bbc98ea72756248a57588d0a01b985b3df48256d94dc3a10ed3813
xen-devel-3.0.3-105.el5_5.3.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 15ebb5dd129a5d0e960d7709b365d090
SHA-256: fb60c55d63e9846326152046446c55a2b42c51084ea88bb16b95d6ce796fd6cd
 
x86_64:
xen-3.0.3-105.el5_5.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 15f965ccd7d30c63c902c1c8fdc133b9
SHA-256: 59762f4a05ff60b17e815e2d70e7d230a5d26aa689fb6f370acbba52d22bd405
xen-devel-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 1b069d56050278617b6008b2e3a5f5c2
SHA-256: ac9faa3398c6a8767b68c5a44acbfa80a55b43c989e7690ee79db6ad3d340610
xen-devel-3.0.3-105.el5_5.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: dd6ccea4d53cc5fc498827feb04e41d6
SHA-256: a4c8c95ed8664760ed18c3c2d013dbbf1e13b426dd8c98eab3f8de7e251e9332
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.3.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 2739101121c1881eaca6f6c3280617d3
SHA-256: ee541ccb1f2af83c563551406496b7e672bd80e7041c661a530b661e27f188eb
 
IA-32:
xen-libs-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0287a376b1276913dce9d80c77af8dbb
SHA-256: d268282f3215bfd4d49c6b1885a4326756962a3f718649f508f685726ee931e5
 
IA-64:
xen-libs-3.0.3-105.el5_5.3.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 9aa75cc823bb996e35d5cef1d18cc590
SHA-256: bf8f0fa588849dc5f171c2b59fff43a98982a8cc3455a3c534cc159aeff4e1e2
 
x86_64:
xen-libs-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0287a376b1276913dce9d80c77af8dbb
SHA-256: d268282f3215bfd4d49c6b1885a4326756962a3f718649f508f685726ee931e5
xen-libs-3.0.3-105.el5_5.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: a8bf5bf96c1e5774159eb2dbb8422927
SHA-256: 17296cec28af5b60ce2b8d77734e13674bb0e77e8ce11640b231297a2e5805bd
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.3.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 2739101121c1881eaca6f6c3280617d3
SHA-256: ee541ccb1f2af83c563551406496b7e672bd80e7041c661a530b661e27f188eb
 
IA-32:
xen-libs-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0287a376b1276913dce9d80c77af8dbb
SHA-256: d268282f3215bfd4d49c6b1885a4326756962a3f718649f508f685726ee931e5
 
x86_64:
xen-libs-3.0.3-105.el5_5.3.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0287a376b1276913dce9d80c77af8dbb
SHA-256: d268282f3215bfd4d49c6b1885a4326756962a3f718649f508f685726ee931e5
xen-libs-3.0.3-105.el5_5.3.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: a8bf5bf96c1e5774159eb2dbb8422927
SHA-256: 17296cec28af5b60ce2b8d77734e13674bb0e77e8ce11640b231297a2e5805bd
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

592219 - Broadcast packets from dom0 does not reach domUs under Xen with bonding configuration



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/