Skip to navigation

Bug Fix Advisory xen bug fix and enhancement update

Advisory: RHBA-2012:0160-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated xen packages that fix various bugs and add several enhancements are now
available for Red Hat Enterprise Linux 5.

The xen packages contain administration tools and the xend service for managing
the kernel-xen kernel for virtualization on Red Hat Enterprise Linux.

These updated xen packages include a number of bug fixes and enhancements. Space
precludes documenting all of these changes in this advisory. Refer to the Red
Hat Enterprise Linux 5.8 Technical Notes for information about these changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.8_Technical_Notes/xen.html#RHBA-2012-0160

All users of xen are advised to upgrade to these updated packages, which provide
numerous bug fixes and enhancements. The system must be rebooted for this update
to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-135.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a039771a06760713de601240912a4084
SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f
 
IA-32:
xen-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 7d8f5f6ff05dd94dd0e33a4bd2d4dc0f
SHA-256: 4a325d9e1fa9971841b4f3cd73c11978d3601666a301259c6355cce06e77781a
xen-devel-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 07998d2e00c57b5484773cb77f35a4bd
SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348
 
x86_64:
xen-3.0.3-135.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 2271471b7d9ff8b6daa1f52a64c60632
SHA-256: d55449399cf74a1b4f8aaf82dfda84b45ce3a74698358008a342739a4f7eebf6
xen-devel-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 07998d2e00c57b5484773cb77f35a4bd
SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348
xen-devel-3.0.3-135.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 07ac6341bedc1341a760989d2e9b6933
SHA-256: 8a8c29daee64f281542386a415899e42572c17a45d33a26db6d7a03c497b7623
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-135.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a039771a06760713de601240912a4084
SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f
 
IA-32:
xen-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 7d8f5f6ff05dd94dd0e33a4bd2d4dc0f
SHA-256: 4a325d9e1fa9971841b4f3cd73c11978d3601666a301259c6355cce06e77781a
xen-devel-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 07998d2e00c57b5484773cb77f35a4bd
SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348
 
IA-64:
xen-3.0.3-135.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: cedc57c8d12b404cfa1f0fc377bcc4ac
SHA-256: aefdac1794498db04b2e9803a53a565e2b43cdc4712f9ce2016791744820c1a9
xen-devel-3.0.3-135.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 0dd0fc1b2482b5996b8466161e41f1c5
SHA-256: 6e13bfa06a5536cf77e9450c2b165a568e757a6ba8fc0cf6e4a6e140aa35209d
 
x86_64:
xen-3.0.3-135.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 2271471b7d9ff8b6daa1f52a64c60632
SHA-256: d55449399cf74a1b4f8aaf82dfda84b45ce3a74698358008a342739a4f7eebf6
xen-devel-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 07998d2e00c57b5484773cb77f35a4bd
SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348
xen-devel-3.0.3-135.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 07ac6341bedc1341a760989d2e9b6933
SHA-256: 8a8c29daee64f281542386a415899e42572c17a45d33a26db6d7a03c497b7623
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-135.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a039771a06760713de601240912a4084
SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f
 
IA-32:
xen-libs-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 08b67af73fc572c1e95c7fb787c86a1e
SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9
 
IA-64:
xen-libs-3.0.3-135.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 7ca408ca687a930564de86a0ac49a9db
SHA-256: fee9199ec14584d0f3f260452eea59d7e03967542593cb078338a583654111a6
 
x86_64:
xen-libs-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 08b67af73fc572c1e95c7fb787c86a1e
SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9
xen-libs-3.0.3-135.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: b29328cbcfb16160dc24ee0b953458e9
SHA-256: 8ea27aef5393258b6722355b594842eab2ecf552c5b11dc4e649bb38a236e3b3
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-135.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: a039771a06760713de601240912a4084
SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f
 
IA-32:
xen-libs-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 08b67af73fc572c1e95c7fb787c86a1e
SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9
 
x86_64:
xen-libs-3.0.3-135.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 08b67af73fc572c1e95c7fb787c86a1e
SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9
xen-libs-3.0.3-135.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: b29328cbcfb16160dc24ee0b953458e9
SHA-256: 8ea27aef5393258b6722355b594842eab2ecf552c5b11dc4e649bb38a236e3b3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

497080 - check amount of free disk space before attempting to suspend
661211 - rhel6 hvm guests get soft lockups if tsc fails
697310 - vif (netback) should take its default MTU from the bridge
699615 - xendomains: cannot start without domain to restore or to create
703693 - [balloon] Set maxmem of hvm guest got error
705831 - add "xm debug-keys"
706859 - [REF] Add file lock to xenconsole
713074 - Missing serial port prevent hvm guest start via libvirt
714855 - Failed to update memory info of "xm list -l" when memory resizing within PV guest
717525 - destroying PV guest too quickly leaves qemu-dm not killed
719294 - HVM guest network outage during live migration
733417 - The network-bridge script does not set the MTU of the bridge to match the MTU of the physical interface
735993 - configuring a SCSI cd-rom in an HVM domain messes up IDE drives
737851 - Disconnecting cdrom image fail
746602 - pygrub cannot start F16 PV guests (GPT partition) under Xen 4.1.1


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/