Skip to navigation

Bug Fix Advisory xen bug fix update

Advisory: RHBA-2010:0572-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-07-29
Last updated on: 2010-07-29
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated Xen packages that fix a bug are now available for Red Hat Enterprise
Linux.

Xen is a high performance and secure open source virtualization framework.
Virtualization lets users run guest operating systems in virtual machines on top
of a host operating system.

These updated Xen packages resolve the following issue:

* xenstore slowly but consistently leaked memory. This caused problems on
systems that ran for a long time. These packages remove this leak. (BZ#616091)

All Xen users are advised to install these updates, which resolve this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a04afe16bd984a2b7286515895baf2c9
SHA-256: f672cfb91dcdf0c1c27a8260192811dae982f33ee51c39159bbc09d961c5a12f
 
IA-32:
xen-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8e02e38436add14a63b53b9ddf2b3577
SHA-256: 9923bbba6a81c97f846989810f8c642e7e9e421ff606676e61fffa0ae5c9e0b2
xen-devel-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 076dd06981e405c459225ca4a05fb77f
SHA-256: a65e3e53ff5d4654d9139f4bd10a84759f9dec1eca954a3bebf6579e23660cd1
 
x86_64:
xen-3.0.3-105.el5_5.5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 71997e28a920033868470915cb0b377b
SHA-256: 5240853b85d13dddc95ff697a01c76c99af37941196efea1ba65b9b61f3b3b9e
xen-devel-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 076dd06981e405c459225ca4a05fb77f
SHA-256: a65e3e53ff5d4654d9139f4bd10a84759f9dec1eca954a3bebf6579e23660cd1
xen-devel-3.0.3-105.el5_5.5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3e55814b95561fcb21feb128aedcbf99
SHA-256: 601bb222eb098f4594bd6926cc51bfd7c333978b6b5678f88efbbea3a1d9827f
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a04afe16bd984a2b7286515895baf2c9
SHA-256: f672cfb91dcdf0c1c27a8260192811dae982f33ee51c39159bbc09d961c5a12f
 
IA-32:
xen-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 8e02e38436add14a63b53b9ddf2b3577
SHA-256: 9923bbba6a81c97f846989810f8c642e7e9e421ff606676e61fffa0ae5c9e0b2
xen-devel-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 076dd06981e405c459225ca4a05fb77f
SHA-256: a65e3e53ff5d4654d9139f4bd10a84759f9dec1eca954a3bebf6579e23660cd1
 
IA-64:
xen-3.0.3-105.el5_5.5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: b5400b43c4813baa0f1bed8e99e2e64e
SHA-256: 444ea420ebf0bf04ccb88460dfd1d481c03e218d3dcc0d70b04dc403d5c138ca
xen-devel-3.0.3-105.el5_5.5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: f5f329fccd8fde38be84e1558988798b
SHA-256: 09f368aad7ff8e85e369988edda80d9c4e300cd080c9f099f045368902b3bbc8
 
x86_64:
xen-3.0.3-105.el5_5.5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 71997e28a920033868470915cb0b377b
SHA-256: 5240853b85d13dddc95ff697a01c76c99af37941196efea1ba65b9b61f3b3b9e
xen-devel-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 076dd06981e405c459225ca4a05fb77f
SHA-256: a65e3e53ff5d4654d9139f4bd10a84759f9dec1eca954a3bebf6579e23660cd1
xen-devel-3.0.3-105.el5_5.5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3e55814b95561fcb21feb128aedcbf99
SHA-256: 601bb222eb098f4594bd6926cc51bfd7c333978b6b5678f88efbbea3a1d9827f
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-105.el5_5.5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a04afe16bd984a2b7286515895baf2c9
SHA-256: f672cfb91dcdf0c1c27a8260192811dae982f33ee51c39159bbc09d961c5a12f
 
IA-32:
xen-libs-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 6819ea55819ae37bd4deba61f4eecda0
SHA-256: ed2aa1cf71bf0e621412664fcaccfc8e163339fb6e91a1556481e798f7bf6e97
 
IA-64:
xen-libs-3.0.3-105.el5_5.5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 64acc45c755c38413b030bd3595f1642
SHA-256: 888cd3b59935ca40e939d47753656832f708286ba195a76c687967aec2620dcb
 
x86_64:
xen-libs-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 6819ea55819ae37bd4deba61f4eecda0
SHA-256: ed2aa1cf71bf0e621412664fcaccfc8e163339fb6e91a1556481e798f7bf6e97
xen-libs-3.0.3-105.el5_5.5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 43122568fbc91948c213902bac1af0f8
SHA-256: 430f204548a6bb142f709c0002bbc4def40fa50c66aa853e4efbe9a3c16e64a2
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-105.el5_5.5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a04afe16bd984a2b7286515895baf2c9
SHA-256: f672cfb91dcdf0c1c27a8260192811dae982f33ee51c39159bbc09d961c5a12f
 
IA-32:
xen-libs-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 6819ea55819ae37bd4deba61f4eecda0
SHA-256: ed2aa1cf71bf0e621412664fcaccfc8e163339fb6e91a1556481e798f7bf6e97
 
x86_64:
xen-libs-3.0.3-105.el5_5.5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 6819ea55819ae37bd4deba61f4eecda0
SHA-256: ed2aa1cf71bf0e621412664fcaccfc8e163339fb6e91a1556481e798f7bf6e97
xen-libs-3.0.3-105.el5_5.5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 43122568fbc91948c213902bac1af0f8
SHA-256: 430f204548a6bb142f709c0002bbc4def40fa50c66aa853e4efbe9a3c16e64a2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

616091 - Memory leak in xenstore



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/