Skip to navigation

Bug Fix Advisory xen bug fix and enhancement update

Advisory: RHBA-2011:0031-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-01-12
Last updated on: 2011-01-12
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated xen packages that fix several bugs and add enhancements are now
available.

The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.

These updated packages include numerous bug fixes for and enhancements
to the xen packages. Space precludes documenting each of these changes
in this advisory and users are directed to the Virtualization chapter
in the Red Hat Enterprise Linux 5.6 Technical Notes:

http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Release_Notes/ar01s02.html

All Red Hat Enterprise Linux 5 users are advised to install these
updated packages, which fix the bugs and add the enhancements noted in
the Red Hat Enterprise Linux 5.6 Technical Notes. The system must be
rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-120.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3102a446d5d57ceaf33216fdd402767b
SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32
 
IA-32:
xen-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 060098f2c146a17bae7e8c01e750736b
SHA-256: 55becae4b5291a691067de054be573a83cc56c9b20b12c1652b38f77a9a53710
xen-devel-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5253348360584807184eba8963ef1a53
SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9
 
x86_64:
xen-3.0.3-120.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 24d30d87636513169f93fb8a225358e3
SHA-256: 01d8f210999c5cf705204345ec6f214b46c228a3dd911b74fe7f192c747b4c38
xen-devel-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5253348360584807184eba8963ef1a53
SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9
xen-devel-3.0.3-120.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 15af696a706710410d823286264267f5
SHA-256: 49bc76033bee9ada1ee7d0e64266c547521532bc9f274ae3f11cd993156d7e7d
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-120.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3102a446d5d57ceaf33216fdd402767b
SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32
 
IA-32:
xen-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 060098f2c146a17bae7e8c01e750736b
SHA-256: 55becae4b5291a691067de054be573a83cc56c9b20b12c1652b38f77a9a53710
xen-devel-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5253348360584807184eba8963ef1a53
SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9
 
IA-64:
xen-3.0.3-120.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 23a3a96013b23b661125d12511954d7c
SHA-256: a8a2a0bfa15d103f1013fe7697f8762a725eff991a2821b006cec7c9c6fb4c01
xen-devel-3.0.3-120.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 2d6dc024046c545ad9797d0af872c7b8
SHA-256: 49a567e5fb159d463f36a9aa6c88ae2786ff78c7dc109e24e66fd183adc06f3b
 
x86_64:
xen-3.0.3-120.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 24d30d87636513169f93fb8a225358e3
SHA-256: 01d8f210999c5cf705204345ec6f214b46c228a3dd911b74fe7f192c747b4c38
xen-devel-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5253348360584807184eba8963ef1a53
SHA-256: 8e2b758cb253d634d1a5d351d25cd4e1c903318d6a7d727cdccf3815e8aa8ed9
xen-devel-3.0.3-120.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 15af696a706710410d823286264267f5
SHA-256: 49bc76033bee9ada1ee7d0e64266c547521532bc9f274ae3f11cd993156d7e7d
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-120.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3102a446d5d57ceaf33216fdd402767b
SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32
 
IA-32:
xen-libs-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 86f30dd37494815437bf36398893e5de
SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d
 
IA-64:
xen-libs-3.0.3-120.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: b16a84e38783e61132b9232c64be0012
SHA-256: 83a33fcfd5382258d815f032a4b6b97fcbbf784c72ce9a47ce9217531a0f2db8
 
x86_64:
xen-libs-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 86f30dd37494815437bf36398893e5de
SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d
xen-libs-3.0.3-120.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 7640df377cd7fec9a93273144c2b5dc4
SHA-256: 855724437d4dc7ff39ca88dbad602556585e7948e0e570df2b078c1435243ea1
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-120.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: 3102a446d5d57ceaf33216fdd402767b
SHA-256: 6c5b928d67a53f1c43ccb79924695dc8ea6686b287488a918e6cc4b588b8ba32
 
IA-32:
xen-libs-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 86f30dd37494815437bf36398893e5de
SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d
 
x86_64:
xen-libs-3.0.3-120.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 86f30dd37494815437bf36398893e5de
SHA-256: 7153d9d6a24db4dd2624b12d3126e4460396e00160c7bea7fb178d917b3dca4d
xen-libs-3.0.3-120.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 7640df377cd7fec9a93273144c2b5dc4
SHA-256: 855724437d4dc7ff39ca88dbad602556585e7948e0e570df2b078c1435243ea1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

416811 - Handle xendomains restore failure gracefully
439279 - Fully-virtualized guests are able to write to read-only disks
443237 - Xen IP antispoofing is not working when multiple antispoof ip addesses are specified
444815 - PVFB's NumLock doesn't stay in sync with host's
486308 - HVM guest stops running when xm save fails
494811 - "migrating-" prefix is not removed from guest's name when migration or xm save fails
495958 - xentop doesn't report vif statistics on bonded interfaces
499616 - virsh erroneously reported successful disk-detach
501026 - 'serial8250: too much work for irq4' message when viewing serial console on SMP full-virtualized xen domU
503290 - long xen domains do not work for storing xen guests during reboot
504278 - xc_save reports success on IA64 although errors are printed to xend.log
509789 - got "received packet with own address as source address" in dom0
511135 - Xen live migrations fail with "Error Internal error .."
513335 - PV guest with VFB device stops running when xm save fails
513431 - PV guest migrations happen even if there is no image file on the destination side.
513537 - 32-bit PV guest on x86_64 host still remains shutdown when 'xm save' failed
514738 - pygrub behaves differently in interactive and non-interactive modes when the default is set to a number that doesn't exist
515238 - Add Qemu disable pci devices patch to support Xen Windows GPLPV drivers
515371 - RFE: Allow interface name definition for xend-relocation-address in /etc/xen/xend-config.sxp
516177 - QEMU AIO for SCSI wanted
520850 - funny error message on detaching nonexistent device
528431 - [mem-set]it should not allow to set the current memory larger than max memory
528448 - [reboot]Sometimes it cannot reboot a domain successfully
529380 - xm man page is inaccurate
532648 - Backport upstream fixes to vbd hotplug
541840 - PV guest hang on boot when VCPU bound to specific CPU
542590 - [RHEL5 Xen]: xm dump-core unpauses a paused guest
544300 - qcow2raw can't open the qcow image
544950 - Trying to save a PV guest with a pci device assigned makes the PV guest hang there
552573 - Formatting a SCSI disk on a Windows Vista 64-bit guest causes Windows to hang
552600 - Fix typo in keymap definitions in Xen
552612 - Caps Lock key in the guest's vnc console does not match the host
556391 - Potential division by zero in NUMA handling
567916 - RHEL5.4-x86_64-PV-guest with a assigned pci device crashed after saved it.
573579 - bonding miimon setting doesn't send gratuitous arp with xen kernel
573768 - Windows Logo testing likes its PCI classes to be consistent
577511 - Grub2 guest support for RHEL5 Xen pygrub
580509 - Give correct memory amount back to dom0 when ballooning fails
580945 - Add HLT instruction emulation to VMXAssist in Xen
586821 - Booting from qcow image not works for hvm
602869 - Live migration broken for HVM (Windows) instances with PV drivers
606919 - Memory leak in xenstore
608072 - updated xm mem-max values not picked up by mem-set, fails with an error
619037 - balloon.free: dom0_alloc should be in KiB
622413 - "xm save" fail for rhel5.5 pv guest on ia64 platform when maxmem > memory
624959 - xend should prevent restarting loops when guest crashes at boot time and dump-core is enabled
626277 - qemu-dm defunct when vif model misspelled
626716 - save a paused PV guest cause start_info page lost
627480 - maxmem preservation after xend restart
628476 - xendomains: fail to rename restore image when restore error occured if mysql-server is not installed
628779 - xendomains: log message mistake when a domain fails to be created
636244 - VMXAssist fixes for Solaris 10 64 bit vm: handle transition from paging-enabled protected mode to real mode + implement additional instructions
639361 - hvm guests fail to save on 32b hosts without pv-on-hvm drivers
645237 - RHEL5.6-Server-i386-xen virsh attach-disk for unexisting cdrom doesn't detect failure
652701 - need to wait for outstanding aio requests before unplugging ide disks



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/