- Issued:
- 2007-11-07
- Updated:
- 2007-11-07
RHEA-2007:0635 - Product Enhancement Advisory
Synopsis
xen enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that support new hypervisor and HVM save/restore are
now available.
Description
The xen package contains the Xen hypervisor and Xen tools that are needed to
run virtual machines on x86 systems, together with the kernel-xen* packages.
The Xen hypervisor has been updated to Xen 3.1, which is not ABI compatible
with the earlier Xen 3.0.3 hypervisor. The new Xen userspace has support for
dealing with the Xen 3.1 hypervisor ABI format. The packages also enable
save and restore with fully virtualized guest domains.
All xen users should upgrade to these updated packages, which contain these
enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 202636 - xenconsoled should persistently log PV console output
- BZ - 202959 - HVM serial console hangs in grub
- BZ - 210141 - XenD HTTP service serializes all requests
- BZ - 211208 - Python error when specifying vnc port
- BZ - 212272 - libxc does not propagate errors during domain creation back to XenD
- BZ - 212662 - Kernel does not re-activate paravirt console mapping during resume/migration
- BZ - 215342 - blktap should error out if disk image is not found prior to starting domain
- BZ - 216169 - vncfb does not run on IA64
- BZ - 216204 - Windows XP install requires F5 for HAL selection
- BZ - 218820 - HVM guests limited to 2G memory
- BZ - 218822 - PAE 4GB bug in hypervisor when using HVM guests with > 4 GB ram
- BZ - 220494 - xend forgets pvfb configuration on restart
- BZ - 220504 - [RHEL5] Xen restore tries to balloon to "maxmem" if specified in the config file
- BZ - 223173 - FEAT: RHEL5.1 VT-i supported as Product
- BZ - 225166 - Fully virtualized virt-install fails from a read-write NFS share
- BZ - 225413 - Useless xen-vncfb process is created for fully virtualized domains
- BZ - 230331 - IA64 Fully virtualized support fails with "Invalid Argument"
- BZ - 230634 - PVFB backend fails to terminate when frontend vanishes early
- BZ - 230790 - HVM: QEMU leaks virtual disk file descriptors to network script causing SELinux AVCs
- BZ - 233433 - Hotplug scripts report errors badly
- BZ - 234166 - QEMU file descriptor leak causes SELinux errors when starting HVM domain
- BZ - 234227 - permission of /var/log/xen/xend-debug.log wrong
- BZ - 236595 - Guest Reboot Fails, 30 Second Shutdown Timeout
- BZ - 237667 - network-bridge fails on some machines
- BZ - 243462 - Update userspace to work against 3.1.0 hypervisor ABI
- BZ - 243884 - Race in vfb/vkbd device setup
- BZ - 245188 - xen-vncfb segfault
- BZ - 248947 - Running i386 FC6 with PVFB causes Dom0 kernel panic
- BZ - 249564 - stopping xend with running domUs destroys xen system
- BZ - 249719 - Package description seems wrong
- BZ - 251407 - Network device doesn't work in 32-bit Vista HVM guests
- BZ - 252359 - Prompted for VNC password after live migration
- BZ - 252361 - xm create complains about keymap option in vfb[]
- BZ - 253583 - Live migration of HVM/Fully-Virt guests crashes target host/dom0
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xen-3.0.3-41.el5.src.rpm | SHA-256: 930029dca525633a54b56de5062df43eac1fedd28bd46d84b87bc977a22d9ec3 |
x86_64 | |
xen-3.0.3-41.el5.x86_64.rpm | SHA-256: 0160b0a202ed0885c4391eb3dbe81ef2f18542e726e4e8ac2fb192206974e783 |
xen-devel-3.0.3-41.el5.i386.rpm | SHA-256: d67a6a78b88173eef80eeed6c8f8caff42d984017cb11cc1597afc2354f17815 |
xen-devel-3.0.3-41.el5.x86_64.rpm | SHA-256: c693c2aa7288a25862a83aadec1a9c408856fe92570e6a05650eb3aaf6d9a4ca |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
xen-libs-3.0.3-41.el5.x86_64.rpm | SHA-256: 26c48452745844e4931b7cdd98528da7136415a9d457cfc2505442516b9a3e34 |
ia64 | |
xen-3.0.3-41.el5.ia64.rpm | SHA-256: f9088402a6ff5ad6c4e16195bcb4370bd8252255949eff4de47351cf8df54cbc |
xen-devel-3.0.3-41.el5.ia64.rpm | SHA-256: 67e84222b45cef8402325395e6790d64550753f15b7c089b502ba441cc5b9ca9 |
xen-libs-3.0.3-41.el5.ia64.rpm | SHA-256: 2bc1737893c5fc0ec75f34c0b1c1ae69c8c986df4e846e4e1d021c54e68f45f0 |
i386 | |
xen-3.0.3-41.el5.i386.rpm | SHA-256: 55b723dccdbe3d604b0d446696e5ccbcd9c6294d16c153efb9339c8abd8c765b |
xen-devel-3.0.3-41.el5.i386.rpm | SHA-256: d67a6a78b88173eef80eeed6c8f8caff42d984017cb11cc1597afc2354f17815 |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xen-3.0.3-41.el5.src.rpm | SHA-256: 930029dca525633a54b56de5062df43eac1fedd28bd46d84b87bc977a22d9ec3 |
x86_64 | |
xen-3.0.3-41.el5.x86_64.rpm | SHA-256: 0160b0a202ed0885c4391eb3dbe81ef2f18542e726e4e8ac2fb192206974e783 |
xen-devel-3.0.3-41.el5.i386.rpm | SHA-256: d67a6a78b88173eef80eeed6c8f8caff42d984017cb11cc1597afc2354f17815 |
xen-devel-3.0.3-41.el5.x86_64.rpm | SHA-256: c693c2aa7288a25862a83aadec1a9c408856fe92570e6a05650eb3aaf6d9a4ca |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
xen-libs-3.0.3-41.el5.x86_64.rpm | SHA-256: 26c48452745844e4931b7cdd98528da7136415a9d457cfc2505442516b9a3e34 |
i386 | |
xen-3.0.3-41.el5.i386.rpm | SHA-256: 55b723dccdbe3d604b0d446696e5ccbcd9c6294d16c153efb9339c8abd8c765b |
xen-devel-3.0.3-41.el5.i386.rpm | SHA-256: d67a6a78b88173eef80eeed6c8f8caff42d984017cb11cc1597afc2354f17815 |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xen-3.0.3-41.el5.src.rpm | SHA-256: 930029dca525633a54b56de5062df43eac1fedd28bd46d84b87bc977a22d9ec3 |
x86_64 | |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
xen-libs-3.0.3-41.el5.x86_64.rpm | SHA-256: 26c48452745844e4931b7cdd98528da7136415a9d457cfc2505442516b9a3e34 |
i386 | |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xen-3.0.3-41.el5.src.rpm | SHA-256: 930029dca525633a54b56de5062df43eac1fedd28bd46d84b87bc977a22d9ec3 |
x86_64 | |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
xen-libs-3.0.3-41.el5.x86_64.rpm | SHA-256: 26c48452745844e4931b7cdd98528da7136415a9d457cfc2505442516b9a3e34 |
i386 | |
xen-libs-3.0.3-41.el5.i386.rpm | SHA-256: 0e72467ecb6d0644613eba91b7cc916fee36051f7213ec169a4bb1de6c4c5e16 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.