Skip to navigation

Bug Fix Advisory xen bug fix update

Advisory: RHBA-2010:0515-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-07-08
Last updated on: 2010-07-08
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated xen packages that add support for the HLT instruction emulation and the
assignment of the Intel 82599 Virtual Function to the Hardware Virtual Machine
(HVM) guest.

Xen is a high performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual machines
on top of a host operating system.

These updated xen packages fix the following bugs:

* due to the missing HLT (halt) instruction emulation in the VMXAssist real-mode
emulator, certain versions of the SYSLINUX boot loader could have caused the
guest operating system (domU) to stop responding. With this update, the HLT
instruction emulation has been added, and all versions of SYSLINUX now boot
properly. (BZ#593230)

* previously, the PCIe Capability Structure was set to 0. As a result, it was
impossible to assign the Niantic Virtual Function (VF) to the Hardware Virtual
Machine (HVM) guest. This has been fixed, and the Niantic VF can now be assigned
as expected. (BZ#599018)

All Xen users should install this update, which addresses these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.4.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 231d7252490f2911cf22c3e25e4e2dc3
SHA-256: 9c149415cee1646fb326bdb4e5cd404f5e6ebbf2097eeb4cd0020c2c36247d77
 
IA-32:
xen-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 210fd650bdcfffcffb60411ef8cd2865
SHA-256: 27677b8af594c87a941170c36531bdb53bfde516a30de56d4c5509a682da76fd
xen-devel-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3f34ea54755d3968ece135caa84224da
SHA-256: db6f3daeed8154f91e48411a795a5f49586b3ac585aae2881e484f4ca709e784
 
x86_64:
xen-3.0.3-105.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 120b82dd4d179cff82ac83a4b4f593f0
SHA-256: 7a8ded7d4043b11e404eb9f157a8100bfcffe7c3c785f3a8c49599710e3063af
xen-devel-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3f34ea54755d3968ece135caa84224da
SHA-256: db6f3daeed8154f91e48411a795a5f49586b3ac585aae2881e484f4ca709e784
xen-devel-3.0.3-105.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: fe793f4fc9c758871c46f89252a1f33d
SHA-256: c6f803b2128b5acfe40c3ecf63004578589a22382f969875a951c286e685af9b
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.4.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 231d7252490f2911cf22c3e25e4e2dc3
SHA-256: 9c149415cee1646fb326bdb4e5cd404f5e6ebbf2097eeb4cd0020c2c36247d77
 
IA-32:
xen-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 210fd650bdcfffcffb60411ef8cd2865
SHA-256: 27677b8af594c87a941170c36531bdb53bfde516a30de56d4c5509a682da76fd
xen-devel-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3f34ea54755d3968ece135caa84224da
SHA-256: db6f3daeed8154f91e48411a795a5f49586b3ac585aae2881e484f4ca709e784
 
IA-64:
xen-3.0.3-105.el5_5.4.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5baaaa6f7fc5fb9e2d6011cc3f5a782b
SHA-256: 0018ca6dc9867e1d2c3421494a888494b10328a0a881f5009edcf7f7f986d7a7
xen-devel-3.0.3-105.el5_5.4.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 7e81e6006d623a296d1b74e360ad0035
SHA-256: 728658ef0c95bd7a6c91a355a973e71d20e98d8d155dd2dc043a067b0901517d
 
x86_64:
xen-3.0.3-105.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 120b82dd4d179cff82ac83a4b4f593f0
SHA-256: 7a8ded7d4043b11e404eb9f157a8100bfcffe7c3c785f3a8c49599710e3063af
xen-devel-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3f34ea54755d3968ece135caa84224da
SHA-256: db6f3daeed8154f91e48411a795a5f49586b3ac585aae2881e484f4ca709e784
xen-devel-3.0.3-105.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: fe793f4fc9c758871c46f89252a1f33d
SHA-256: c6f803b2128b5acfe40c3ecf63004578589a22382f969875a951c286e685af9b
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.4.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 231d7252490f2911cf22c3e25e4e2dc3
SHA-256: 9c149415cee1646fb326bdb4e5cd404f5e6ebbf2097eeb4cd0020c2c36247d77
 
IA-32:
xen-libs-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8af010a9ed24670488fe13b4c59c54b4
SHA-256: 412d09e50935b4182e0bf22b1e987e185e3e01f0a8ab77092a67538933ee02e4
 
IA-64:
xen-libs-3.0.3-105.el5_5.4.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5cee5724b24642c637e4770ec1a1dd30
SHA-256: fff904c1d4aa10fedc201f23410db123b821a8250b0122dc582b07e5c6bfce06
 
x86_64:
xen-libs-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8af010a9ed24670488fe13b4c59c54b4
SHA-256: 412d09e50935b4182e0bf22b1e987e185e3e01f0a8ab77092a67538933ee02e4
xen-libs-3.0.3-105.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 61b901873b6f3d9602317cb86299d46b
SHA-256: b988206021187cb0e13a81ff5f7449ad269608e01ae0854aeb7347b8a787e5ae
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.4.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 231d7252490f2911cf22c3e25e4e2dc3
SHA-256: 9c149415cee1646fb326bdb4e5cd404f5e6ebbf2097eeb4cd0020c2c36247d77
 
IA-32:
xen-libs-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8af010a9ed24670488fe13b4c59c54b4
SHA-256: 412d09e50935b4182e0bf22b1e987e185e3e01f0a8ab77092a67538933ee02e4
 
x86_64:
xen-libs-3.0.3-105.el5_5.4.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8af010a9ed24670488fe13b4c59c54b4
SHA-256: 412d09e50935b4182e0bf22b1e987e185e3e01f0a8ab77092a67538933ee02e4
xen-libs-3.0.3-105.el5_5.4.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 61b901873b6f3d9602317cb86299d46b
SHA-256: b988206021187cb0e13a81ff5f7449ad269608e01ae0854aeb7347b8a787e5ae
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

593230 - Add HLT instruction emulation to VMXAssist in Xen
599018 - ixgbe VFs cannot be assigned to HVM guest



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/