- Issued:
- 2012-02-15
- Updated:
- 2012-02-15
RHBA-2012:0138 - Bug Fix Advisory
Synopsis
xen bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that fix one bug are now available for Red Hat Enterprise
Linux 5 Extended Update Support.
Description
Xen is a high-performance and secure open-source virtualization framework. The
xen packages contain administration tools and the xend service for managing the
kernel-xen kernel for virtualization on Red Hat Enterprise Linux.
This update fixes the following bug:
- Microsoft's Server Virtualization Validation Platform (SVVP) tests detected
unreliability of the emulated High Performance Event Timer (HPET) on some hosts.
To fix this problem, this update introduces the new "hpet" option that allows to
configure HPET support per domain. If HPET support is disabled, the guest will
choose a more reliable timer source. Disabling the HPET is suggested for Windows
guests, as well as fully-virtualized Linux guests that show occasional "time
went backwards" errors in the console. However, the HPET table remains present
in guest's ACPI Differentiated System Description Table (DSDT) even if HPET
support is disabled, and HPET support can be enabled again when required.
Additionally, this update also allows Xen to dynamically indicate presence of
the COM1 and COM2 ports on quests. (BZ#773361)
All users of xen are advised to upgrade to these updated packages, which fix
this bug. Note that after installation, xend must be restarted for this update
to take effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 x86_64
- Red Hat Enterprise Linux Server - AUS 5.6 ia64
- Red Hat Enterprise Linux Server - AUS 5.6 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6
SRPM | |
---|---|
xen-3.0.3-120.el5_6.5.src.rpm | SHA-256: 6cc55f898404c49d4f221e019b4c11d4b4a07bee0ef24a01d4cd68bdd1cb9afb |
x86_64 | |
xen-3.0.3-120.el5_6.5.x86_64.rpm | SHA-256: 74915ea0316646ba0d7849384e442ae06f101356ee89e40e593869d66113adbd |
xen-devel-3.0.3-120.el5_6.5.i386.rpm | SHA-256: e8b5a2ae283ff5421535caa3104f2e278aec47d6009ffecd3ccfb66708799594 |
xen-devel-3.0.3-120.el5_6.5.x86_64.rpm | SHA-256: a13eb9be5ca2eead9b31a95750c17c6016e1667ae6d2fdababea02c6e55c8b31 |
xen-libs-3.0.3-120.el5_6.5.i386.rpm | SHA-256: 17230ffe8a20472952273409dd43d15d2d73aa2b68c5800e36d068d40ecc1443 |
xen-libs-3.0.3-120.el5_6.5.x86_64.rpm | SHA-256: 8b89fee95cd352fe2dd1d54ebc3b7dd9302536c2db4760851077448ab03c338e |
ia64 | |
xen-3.0.3-120.el5_6.5.ia64.rpm | SHA-256: abbe1c07e7a4eb3e4df49e63d18c17cf35ab330f1fcd7f434da04f300395727c |
xen-devel-3.0.3-120.el5_6.5.ia64.rpm | SHA-256: 22e30f28448add608bfde3c29d1533554ae51740ecd58df6f64ee6e87eb67882 |
xen-libs-3.0.3-120.el5_6.5.ia64.rpm | SHA-256: d00ac8b918ea60e17b2e317470ac1d5cb04dfacbd9384a124a3fd0363f4d2ade |
i386 | |
xen-3.0.3-120.el5_6.5.i386.rpm | SHA-256: f721a160d1ca758f251963cb9569bb0bc49c5601ea1e789eb38f3ead8dbe5038 |
xen-devel-3.0.3-120.el5_6.5.i386.rpm | SHA-256: e8b5a2ae283ff5421535caa3104f2e278aec47d6009ffecd3ccfb66708799594 |
xen-libs-3.0.3-120.el5_6.5.i386.rpm | SHA-256: 17230ffe8a20472952273409dd43d15d2d73aa2b68c5800e36d068d40ecc1443 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6
SRPM | |
---|---|
xen-3.0.3-120.el5_6.5.src.rpm | SHA-256: 6cc55f898404c49d4f221e019b4c11d4b4a07bee0ef24a01d4cd68bdd1cb9afb |
x86_64 | |
xen-libs-3.0.3-120.el5_6.5.i386.rpm | SHA-256: 17230ffe8a20472952273409dd43d15d2d73aa2b68c5800e36d068d40ecc1443 |
xen-libs-3.0.3-120.el5_6.5.x86_64.rpm | SHA-256: 8b89fee95cd352fe2dd1d54ebc3b7dd9302536c2db4760851077448ab03c338e |
i386 | |
xen-libs-3.0.3-120.el5_6.5.i386.rpm | SHA-256: 17230ffe8a20472952273409dd43d15d2d73aa2b68c5800e36d068d40ecc1443 |
Red Hat Enterprise Linux Server - AUS 5.6
SRPM | |
---|---|
xen-3.0.3-120.el5_6.5.src.rpm | SHA-256: 6cc55f898404c49d4f221e019b4c11d4b4a07bee0ef24a01d4cd68bdd1cb9afb |
x86_64 | |
xen-3.0.3-120.el5_6.5.x86_64.rpm | SHA-256: 74915ea0316646ba0d7849384e442ae06f101356ee89e40e593869d66113adbd |
xen-devel-3.0.3-120.el5_6.5.i386.rpm | SHA-256: e8b5a2ae283ff5421535caa3104f2e278aec47d6009ffecd3ccfb66708799594 |
xen-devel-3.0.3-120.el5_6.5.x86_64.rpm | SHA-256: a13eb9be5ca2eead9b31a95750c17c6016e1667ae6d2fdababea02c6e55c8b31 |
xen-libs-3.0.3-120.el5_6.5.i386.rpm | SHA-256: 17230ffe8a20472952273409dd43d15d2d73aa2b68c5800e36d068d40ecc1443 |
xen-libs-3.0.3-120.el5_6.5.x86_64.rpm | SHA-256: 8b89fee95cd352fe2dd1d54ebc3b7dd9302536c2db4760851077448ab03c338e |
ia64 | |
xen-3.0.3-120.el5_6.5.ia64.rpm | SHA-256: abbe1c07e7a4eb3e4df49e63d18c17cf35ab330f1fcd7f434da04f300395727c |
xen-devel-3.0.3-120.el5_6.5.ia64.rpm | SHA-256: 22e30f28448add608bfde3c29d1533554ae51740ecd58df6f64ee6e87eb67882 |
xen-libs-3.0.3-120.el5_6.5.ia64.rpm | SHA-256: d00ac8b918ea60e17b2e317470ac1d5cb04dfacbd9384a124a3fd0363f4d2ade |
i386 | |
xen-3.0.3-120.el5_6.5.i386.rpm | SHA-256: f721a160d1ca758f251963cb9569bb0bc49c5601ea1e789eb38f3ead8dbe5038 |
xen-devel-3.0.3-120.el5_6.5.i386.rpm | SHA-256: e8b5a2ae283ff5421535caa3104f2e278aec47d6009ffecd3ccfb66708799594 |
xen-libs-3.0.3-120.el5_6.5.i386.rpm | SHA-256: 17230ffe8a20472952273409dd43d15d2d73aa2b68c5800e36d068d40ecc1443 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.