- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0160 - Bug Fix Advisory
Synopsis
xen bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that fix various bugs and add several enhancements are now
available for Red Hat Enterprise Linux 5.
Description
The xen packages contain administration tools and the xend service for managing
the kernel-xen kernel for virtualization on Red Hat Enterprise Linux.
These updated xen packages include a number of bug fixes and enhancements. Space
precludes documenting all of these changes in this advisory. Refer to the Red
Hat Enterprise Linux 5.8 Technical Notes for information about these changes:
All users of xen are advised to upgrade to these updated packages, which provide
numerous bug fixes and enhancements. The system must be rebooted for this update
to take effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 497080 - check amount of free disk space before attempting to suspend
- BZ - 661211 - rhel6 hvm guests get soft lockups if tsc fails
- BZ - 697310 - vif (netback) should take its default MTU from the bridge
- BZ - 699615 - xendomains: cannot start without domain to restore or to create
- BZ - 703693 - [balloon] Set maxmem of hvm guest got error
- BZ - 705831 - add "xm debug-keys"
- BZ - 706859 - [REF] Add file lock to xenconsole
- BZ - 713074 - Missing serial port prevent hvm guest start via libvirt
- BZ - 714855 - Failed to update memory info of "xm list -l" when memory resizing within PV guest
- BZ - 717525 - destroying PV guest too quickly leaves qemu-dm not killed
- BZ - 719294 - HVM guest network outage during live migration
- BZ - 733417 - The network-bridge script does not set the MTU of the bridge to match the MTU of the physical interface
- BZ - 735993 - configuring a SCSI cd-rom in an HVM domain messes up IDE drives
- BZ - 737851 - Disconnecting cdrom image fail
- BZ - 746602 - pygrub cannot start F16 PV guests (GPT partition) under Xen 4.1.1
CVEs
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xen-3.0.3-135.el5.src.rpm | SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f |
x86_64 | |
xen-3.0.3-135.el5.x86_64.rpm | SHA-256: d55449399cf74a1b4f8aaf82dfda84b45ce3a74698358008a342739a4f7eebf6 |
xen-devel-3.0.3-135.el5.i386.rpm | SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348 |
xen-devel-3.0.3-135.el5.x86_64.rpm | SHA-256: 8a8c29daee64f281542386a415899e42572c17a45d33a26db6d7a03c497b7623 |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
xen-libs-3.0.3-135.el5.x86_64.rpm | SHA-256: 8ea27aef5393258b6722355b594842eab2ecf552c5b11dc4e649bb38a236e3b3 |
ia64 | |
xen-3.0.3-135.el5.ia64.rpm | SHA-256: aefdac1794498db04b2e9803a53a565e2b43cdc4712f9ce2016791744820c1a9 |
xen-devel-3.0.3-135.el5.ia64.rpm | SHA-256: 6e13bfa06a5536cf77e9450c2b165a568e757a6ba8fc0cf6e4a6e140aa35209d |
xen-libs-3.0.3-135.el5.ia64.rpm | SHA-256: fee9199ec14584d0f3f260452eea59d7e03967542593cb078338a583654111a6 |
i386 | |
xen-3.0.3-135.el5.i386.rpm | SHA-256: 4a325d9e1fa9971841b4f3cd73c11978d3601666a301259c6355cce06e77781a |
xen-devel-3.0.3-135.el5.i386.rpm | SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348 |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xen-3.0.3-135.el5.src.rpm | SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f |
x86_64 | |
xen-3.0.3-135.el5.x86_64.rpm | SHA-256: d55449399cf74a1b4f8aaf82dfda84b45ce3a74698358008a342739a4f7eebf6 |
xen-devel-3.0.3-135.el5.i386.rpm | SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348 |
xen-devel-3.0.3-135.el5.x86_64.rpm | SHA-256: 8a8c29daee64f281542386a415899e42572c17a45d33a26db6d7a03c497b7623 |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
xen-libs-3.0.3-135.el5.x86_64.rpm | SHA-256: 8ea27aef5393258b6722355b594842eab2ecf552c5b11dc4e649bb38a236e3b3 |
i386 | |
xen-3.0.3-135.el5.i386.rpm | SHA-256: 4a325d9e1fa9971841b4f3cd73c11978d3601666a301259c6355cce06e77781a |
xen-devel-3.0.3-135.el5.i386.rpm | SHA-256: 30a2914def6bdf676bd2524d2c5382986d42d2d16d27a7f2f1f5037f96166348 |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xen-3.0.3-135.el5.src.rpm | SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f |
x86_64 | |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
xen-libs-3.0.3-135.el5.x86_64.rpm | SHA-256: 8ea27aef5393258b6722355b594842eab2ecf552c5b11dc4e649bb38a236e3b3 |
i386 | |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xen-3.0.3-135.el5.src.rpm | SHA-256: d5703c82762a83e518af4a3595b68b1ef9aa56ebee4627cf28adcb3c68f26c1f |
x86_64 | |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
xen-libs-3.0.3-135.el5.x86_64.rpm | SHA-256: 8ea27aef5393258b6722355b594842eab2ecf552c5b11dc4e649bb38a236e3b3 |
i386 | |
xen-libs-3.0.3-135.el5.i386.rpm | SHA-256: 3c2150e6beb0c7fb385c054c2261bf29e069bacb0e67d20da28aa17d2a5969f9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.