RHBA-2009:1092xen bug fix updateXen is a high performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.
These updated xen packages fix the following bug:
* the Linux bonding driver aggregates multiple network interfaces into a
single, local "bonded" interface. The 802.1Q specification (also known as
VLAN tagging) allows multiple bridged networks to transparently share a
single physical network link. When attempting to use a bonded interface and
802.1Q VLAN tagging together, the "network-bridge-bonding" networking
script incorrectly called the ifdown command on interfaces other than
"bond0", with the result that only the bond0 bridge became active (and not,
for example, the "bond0.5" bridge). With these updated packages, using
interface bonding together with 802.1Q VLAN tagging works as expected and
all interfaces that are expected to become active do so, thus resolving the
issue.
All users of the xen packages are advised to upgrade to these updated
packages, which resolve this issue.network-bridge-bonding doesn't support 802.1q vlansRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-80.el5_3.3.i386.rpm70ed8dafce946817d5fdc4dd7db537d7xen-3.0.3-80.el5_3.3.i386.rpm0df041e0a94977152a142bc47f518be6RHSA-2008:0194Important: xen security and bug fix updateThe xen packages contain tools for managing the virtual machine monitor in
Red Hat Virtualization.
These updated packages fix the following security issues:
Daniel P. Berrange discovered that the hypervisor's para-virtualized
framebuffer (PVFB) backend failed to validate the format of messages
serving to update the contents of the framebuffer. This could allow a
malicious user to cause a denial of service, or compromise the privileged
domain (Dom0). (CVE-2008-1944)
Markus Armbruster discovered that the hypervisor's para-virtualized
framebuffer (PVFB) backend failed to validate the frontend's framebuffer
description. This could allow a malicious user to cause a denial of
service, or to use a specially crafted frontend to compromise the
privileged domain (Dom0). (CVE-2008-1943)
Chris Wright discovered a security vulnerability in the QEMU block format
auto-detection, when running fully-virtualized guests. Such
fully-virtualized guests, with a raw formatted disk image, were able
to write a header to that disk image describing another format. This could
allow such guests to read arbitrary files in their hypervisor's host.
(CVE-2008-2004)
Ian Jackson discovered a security vulnerability in the QEMU block device
drivers backend. A guest operating system could issue a block device
request and read or write arbitrary memory locations, which could lead to
privilege escalation. (CVE-2008-0928)
Tavis Ormandy found that QEMU did not perform adequate sanity-checking of
data received via the "net socket listen" option. A malicious local
administrator of a guest domain could trigger this flaw to potentially
execute arbitrary code outside of the domain. (CVE-2007-5730)
Steve Kemp discovered that the xenbaked daemon and the XenMon utility
communicated via an insecure temporary file. A malicious local
administrator of a guest domain could perform a symbolic link attack,
causing arbitrary files to be truncated. (CVE-2007-3919)
As well, in the previous xen packages, it was possible for Dom0 to fail to
flush data from a fully-virtualized guest to disk, even if the guest
explicitly requested the flush. This could cause data integrity problems on
the guest. In these updated packages, Dom0 always respects the request to
flush to disk.
Users of xen are advised to upgrade to these updated packages, which
resolve these issues.CVE-2007-3919 xen xenmon.py / xenbaked insecure temporary file accesssCVE-2007-5730 QEMU Buffer overflow via crafted "net socket listen" optionCVE-2008-0928 Qemu insufficient block device address range checking[RHEL5.2]: LTC41676-Xen full virt has data integrity issueCVE-2008-1943 PVFB backend fails to validate frontend's framebuffer descriptionCVE-2008-1944 PVFB SDL backend chokes on bogus screen updatesCVE-2008-2004 qemu/kvm/xen: qemu block format auto-detection vulnerabilityRHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-41.el5_1.5.i386.rpm01bfef5c31ceb34204dc399bd83e347axen-devel-3.0.3-41.el5_1.5.i386.rpm6e4aad94c98dd23365e85ac79bf106f3RHBA-2009:0118xen bug fix and enhancement updateXen is a high performance and secure open source virtualization framework.
Virtualization allows users to run many guest virtual machines on top of a
host operating system.
This erratum includes the following bug fixes and enhancements:
- Rotate all log files periodically
- Fix overflow in qemu-img
- Fix race in DMA thread
- Fix blktap data access alignment
- Do not unpause domain after taking core
- Persist device model PID across restarts
- Pass internal libxc return value back to caller
- Fix passing of domid to libxc from python IOport & IRQ controllers
- Do not try to balloon more than physical RAM
- Add blktap sub-type checks
- Respect nographics request for HVM
- Put xenstored database on tmpfs
- Prefer grub.conf in pygrub
- Do not throw errors when listing domain
- Add mouse wheel support to PVFB
Users of Xen are advised to upgrade to these updated packages, which
include these bug fixes and enhancements.pygrub tries to read menu.lst before grub.conf, tries to start non-existent kernelError: Device 0 not connectedqemu-dm segfaulting for fully-vritualized guestxen tools - blktap outputs unaligned access errornetwork-bridge do not work with vlan interfacesNo ethernet controller driver on windows 2003 server of IA64 platformDrop in support for logrotatetimer stops running after live migrate or dom0 reboot & save/restore of a Xen guestbonding + arp monitoring + xen cause interface flappingxen: buffer overflow detected: qcow-create terminatedNetwork-attach command mismatches the usage.Using sdaa as a guest device results in corupted device name inside the guest'xm dump-core --crash' does not stop guest domain in timeCannot use attach disk if subdriver option is wrong in blktapUnable to create a PV guest with > 3 disksxend / xenstored performance & scalability issuesXen Support more than 16 disk devices (userland)RHEL5.3 xen: include support for booting Fedora 10 DomU (i.e. bzImage support)xenstored fails to start because selinux prevents access to files on tmpfsProblems occur when executing 'xm reboot' on the second time.[RHEL5.3]: xm block-detach no longer worksRHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-80.el5.i386.rpmf3b547263eb4d8c8f4ed7a209ffadf3bxen-devel-3.0.3-80.el5.i386.rpmb732c37cce14ff32c882e9f1f185d84fRHSA-2007:0114Important: xen security updateThe Xen package contains the tools for managing the virtual machine monitor
in Red Hat Enterprise Linux virtualization.
A flaw was found affecting the VNC server code in QEMU. On a
fullyvirtualized guest VM, where qemu monitor mode is enabled, a user who
had access to the VNC server could gain the ability to read arbitrary files
as root in the host filesystem. (CVE-2007-0998)
In addition to disabling qemu monitor mode, the following bugs were also fixed:
* Fix IA64 fully virtualized (VTi) shadow page table mode initialization.
* Fix network bonding in balanced-rr mode. Without this update, a network
path loss could result in packet loss.
Users of Xen should update to these erratum packages containing backported
patches which correct these issues.CVE-2007-0998 HVM guest VNC server allows compromise of entire host OS by any VNC console userRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-25.0.3.el5.i386.rpm160836bd41a0d666fd7a6289f718c741xen-3.0.3-25.0.3.el5.i386.rpm572e398fbc504adaae182b3ba040920fRHBA-2008:0279xen bug fix updateThe xen packages contain tools for managing the virtual machine monitor
in Red Hat Enterprise Linux Virtualization.
A patch that validated disk sharing caused a race condition when booting
guests that have multiple disks. This prevented guests with multiple disks
from booting successfully.
Users of xen are advised to upgrade to these updated packages, which
resolve this issue.Unable to create a PV guest with > 3 disksRHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-64.el5_2.1.i386.rpm663593100c279ca91b07fb38f460fd4fxen-devel-3.0.3-64.el5_2.1.i386.rpmd4759cbfced70f839e17331dce4a9640RHBA-2009:0137virt-manager enhancement and bug fix updateVirtual Machine Manager (virt-manager) provides a graphical tool for
administering virtual machines such as Xen. It uses libvirt as the backend
management API.
This updated virt-manager package provides the following enhancements:
* Network bridges created on bonding/vlan devices are now listed
* VNC keymap can now be specified when adding a graphics device to an
existing VM
In addition, this updated package provides fixes for the following bugs:
* A Memory leak occurs if virt-manager is left running for a long while
* 'Disk size' value is overwritten if pressing 'back' in the VM creation wizard
* Cannot change current memory and max memory simultaneously for an
existing guest (only max memory is honored)
* Max memory can be set lower than current memory value if manually entered
* Preceding or trailing whitespace when specifying an install URL or
kickstart file causes install to fail
* Opening a xen connection via File -> Open Connection -> xen conflicts
with the default xen connection
* Pressing 'Enter' after manually typing a path in the various file
choosers does not update the chooser's directory contents.
* Network creation wizard can be launched even if virt-manager is not
connected to the hypervisor.
* Sizes for block devices are not shown in the summary section of the 'Add
Hardware' and 'New VM' wizards
* The default bridge selection is incorrect on a system with two network
cards, and could cause the 'Add Hardware' wizard or 'New VM' wizard to fail
* Help contents in the 'Host Details' section pointed to non-existent docs.
* A VM's open serial console does not print new output after the VM is
rebooted.
* The --show-* command line commands do not work, breaking gnome-vm-applet.
Users of virt-manager are advised to upgrade to this updated package, which
provide these enhancements and bug fixes.virt-manager serial console doesn't refresh during reboot[PATCH] unable to set current / max memory allocation simultaneously[PATCH] able to set maxmem lower than current mem allocationvirt-manager needs to trim input textVM applet will not open Virtual console for domainvirt-manager/clicking on about dialog brings up help pagevirt-manager never displays "finish" button if shared physical device selected during creation of FV guestSetting of disk-size is lost when clicking button "back"CRM #1831514 - virt-manager/ Remove showing incorrect partition size while adding block devicesShouldn't launch network creator if not connected to hypervisor.RHEL Virtualization (v. 5 for 32-bit x86)virt-manager-0.5.3-10.el5.i386.rpm14b3889cd4486a2c0713ac9bdf173692RHSA-2007:0323Important: xen security updateThe Xen package contains the tools for managing the virtual machine monitor
in Red Hat Enterprise Linux virtualization.
The following security flaws are fixed in the updated Xen package:
Joris van Rantwijk found a flaw in the Pygrub utility which is used as a
boot loader for guest domains. A malicious local administrator of a guest
domain could create a carefully crafted grub.conf file which would trigger
the execution of arbitrary code outside of that domain. (CVE-2007-4993)
Tavis Ormandy discovered a heap overflow flaw during video-to-video copy
operations in the Cirrus VGA extension code used in Xen. A malicious local
administrator of a guest domain could potentially trigger this flaw and
execute arbitrary code outside of the domain. (CVE-2007-1320)
Tavis Ormandy discovered insufficient input validation leading to a heap
overflow in the Xen NE2000 network driver. If the driver is in use, a
malicious local administrator of a guest domain could potentially trigger
this flaw and execute arbitrary code outside of the domain. Xen does not
use this driver by default. (CVE-2007-1321)
Users of Xen should update to these erratum packages containing backported
patches which correct these issues.CVE-2007-1320 xen Cirrus LGD-54XX "bitblt" Heap OverflowCVE-2007-1321 xen QEMU NE2000 emulation issuesCVE-2007-4993 xen guest root can escape to domain 0 through pygrubRHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-25.0.4.el5.i386.rpmf41141cc620e161fedd68456d91c0103xen-devel-3.0.3-25.0.4.el5.i386.rpm29bcc93687b19f3388db33fbc7967466RHBA-2008:0291libvirt bug fix and enhancement updateLibvirt is a C toolkit to interact with the virtualization capabilities of
recent versions of Linux, and other operating systems.
These updated packages fix the following bugs:
* running the "virsh attach-disk" or "virsh attach-interface" commands on
an inactive domain caused a segmentation fault.
* the "virsh vcpupin" command did not return an error when the vcpu
argument was not a number. For example, running the "virsh vcpupin [domain]
a1 [cpulist]" command, caused virtual CPU 0 to be used instead of returning
an error.
* the "virt-install" command hanged in an endless loop when 32 or more
network interface cards were specified as a parameter using the "--network"
option.
* it was not possible to create a domain using the "--hvm" and "--cdrom"
options. For example, running the "virt-install" command with the "--hvm"
and "--cdrom" options caused the following errors:
libvir: Xen error : Domain not found: xenUnifiedDomainLookupByUUID
libvir: Xen error : Domain not found: xenUnifiedDomainLookupByName
Creating domain...
virDomainDefineXML() failed
This has been resolved in these updated packages.
* attempting to attach a disk to an active domain using the "virsh
attach-disk" command caused the following error:
libvir: Xen Daemon error : POST operation failed:
(xend.err'device_configure () takes exactly 2 arguments (3 given)')
This has been resolved in these updated packages.
As well, these updated packages add the following enhancements:
* in previous versions of libvirt, it was not possible to specify physical
CPU affinity at creation time. This information was not stored permanently.
These updated packages allow you to specify CPU affinity information in the
domain XML definition file, and this information is also provided when
saving a domain XML definition file. This is useful for systems using the
NUMA architecture.
* libvirt now has support for NUMA. New APIs are provided, and the virsh
"freecell" command allows you to check the available heap memory of NUMA
cells. The virsh "capabilities" command can be used to expose NUMA topology
on systems using the NUMA architecture.
* in previous libvirt packages, it was only possible to set CPU
information, for example, CPU pinning, for the active domain. In these
updated packages, it is possible to set CPU information for inactive
domains.
* support for USB tablet has been added, which improves fully virtualized
mouse behavior.
* new APIs which improve libvirt monitoring support have been added. These
new APIs provide statistics for block and interface devices. Use the virsh
"domblkstat" and "domifstat" commands to view this information.
Users of libvirt are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.[5.2] virt-install hangs up when 32 NICs or more are specified as --network optionlibvirt: fix segmentation fault when buffer needs to be reallocated[5.2]Cannot create the HVM domain using CD-ROM device because virDomainDefineXML() fails.[5.2] Disk cannot be attached by using virsh attach-disk.libvirt mis-detects hypervisor version for NUMA apisssh remote connection errors with "Cannot allocate memory"Can't start second guest via virt-manager while using shared block devicesRHEL Virtualization (v. 5 for 32-bit x86)libvirt-0.3.3-7.el5.i386.rpm3d96954f7cb1317f3ccd6a098743ff57libvirt-devel-0.3.3-7.el5.i386.rpm6a371da99c201cab60d0bc2a09fac005libvirt-python-0.3.3-7.el5.i386.rpm9fba7650d9a288a22187a3311f5068daRHBA-2009:0141new package: libvirt-cimThe libvirt-cim package is a Common Manageablity Programming Interface
(CMPI) CIM provider that implements the Distributed Management Task Force's
(DMTF's) System Virtualization, Partitioning and Clustering (SVPC)
virtualization model. This package supports most of the features of libvirt
and enables management of multiple platforms with a single provider.
Users requiring CIM support based on libvirt should install this new
package which provides this functionality.RHEL Virtualization (v. 5 for 32-bit x86)libvirt-cim-0.5.1-4.el5.i386.rpm2b806061eba552c35eecc9145b23f7bdRHBA-2009:1328xen bug fix and enhancement updateThe xen packages contain tools for managing the virtual machine monitor in
Red Hat Enterprise Linux Virtualization.
These updated packages fix the following bugs:
* fix CPUs pinning in guest's configuration after save/restore sequence
(BZ#228890)
* kernel command line could not be edited in IA64 PV guests during boot
(BZ#249791)
* disallow migration for domains with attached PCI devices (BZ#334821)
* give memory back to dom0 if autoballooning failed (BZ#345271)
* credit scheduler parameters were not preserved during guest restart
(BZ#345321)
* exclusively used devices could be attached to more than one guest at a
time (BZ#345441)
* allow HVM guests creation under tight memory conditions (BZ#419771)
* migration of PV guests could hang on failure (BZ#428691)
* xend and xendomains init scripts returned wrong exit codes (BZ#430904)
* vfb and vkbd entries were not removed from xenstore after destroying a
guest (BZ#439182)
* saving a guest reported success even if the operation failed (BZ#451675)
* the "xm console" documentation was updated to mention Ctrl-] sequence
which escapes from xenconsole (BZ#454611)
* creating a guest could fail under heavy I/O in dom0 (BZ#456926)
* serialize iptables calls in hotplug scripts (BZ#460410)
* HVM guests suffered from missing clock interrupts (BZ#465116)
* P-V guests could not be rebooted after restarting xend
(BZ#468971,BZ#474579)
* Xen network-bridge script didn't work when source address was specified
for default route (BZ#475249)
* passing out-of-range identification of an IDE disk caused a guest to
misbehave or crash (BZ#475433)
* bogus MAC address was allowed to be specified for a virtual NIC
(BZ#476611)
* data corruption occurred on guests with virtual SCSI disks larger than
1TB (BZ#479339)
* HVM guests suffered from time skews (BZ#480689)
* avoid SCSI device data corruptions on HVM guests with >4GB RAM
(BZ#480843)
* flush Xen SCSI driver buffer to disk before returning from
scsi_write_data() function (BZ#481782)
* correctly handle device detach attempts for devices mounted in guest
(BZ#484110)
* "xm dump-core" didn't truncate existing files (BZ#484346)
* QCOW images were created with wrong byte order (BZ#485471)
* P-V guest didn't resume after failed save or migration (BZ#486157)
* xenconsole didn't work after failed save or migration (BZ#486291)
* QCOW images couldn't be used with PV guests or HVM guests with PV drivers
(BZ#486353)
* xend didn't stop in runlevels 0, 1, and 6 (BZ#490053)
* libxenstore would leak memory on every @domainIntroduced event
(BZ#490158)
* boot first entry in guest's grub.conf if default boot configuration is
invalid (BZ#490754)
* pygrub would ignore "default" and "timeout" options in elilo.conf
(BZ#491408)
* bridged network didn't work well when used together with bonding and
802.1q VLANs (BZ#492258)
These updated packages add the following enhancements:
* support for F11 and F12 keys in HVM BIOS (BZ#338321)
* support for Ctrk-Alt-Del in HVM BIOS (BZ#338331)
* support for global default keymap setting (BZ#345251)
* support for save, restore, migration and dump-core of 32b guests on a 64b
host (BZ#425411, BZ#480118)
* support for attaching PCI devices to HVM guests using VT-d (BZ#480520)
* support for virtual SCSI disks larger than 2TB (BZ#482780)
* support for local migrations (BZ#484967)
* support for 1GB host page tables (BZ#487342)
* support for relative mouse offset VNC extension (BZ#487559)
* support for INT13 LBA48 extensions in HVM BIOS (BZ#487907)
* fix PCIe NICs on Stoakley detach problem (BZ#507179)
* fix guest reboot with VT-d device assigned (BZ#507182)
* add BDFs duplicate check in HVM configure file (BZ#507195)
* fix MSI-X NIC hotplug removal (BZ#507198)
* fix `xm pci-list` BDF output on WeyBridge platform (BZ#507257)
* set cpu_weight default value back to 256 (BZ#508680)
Users of xen are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.Pinned CPUs of guests are unpinned after save/restore sequence[RHEL 5.2] Xen 3.1.1 Prevent migration with attached PCI devices[RHEL 5.2] Xen 3.1.1 Add F11/F12 key support to hvm bios[RHEL 5.2] Xen 3.1.1 Add ctrl-alt-del reboot to hvm bios[RHEL 5.2] Xen 3.1.1: Add default keymap option to config.sxp[RHEL 5.2] Xen 3.1.1: Give memory back to dom0 after failed autoballoon[RHEL 5.2] Xen 3.1.1: Fix sched params to stick on reboot and be accurate in xm list[RHEL 5.2] Xen 3.1.1: Add vbd and vif duplication checksCreating full virt domain fails showing 'cannot allocate memory'[RHEL5.2]: i386 PV guests on x86_64 HV fail "xm save"[RHEL5]: xend and xendomains init scripts have wrong return values[RHEL5.2]: Running "xm destroy" on a domain with PVFB causes a xenstore leak[man] Ctrl+] not documented for xenconsolevirt-install with 8GB of ram aborts after it creates the storage file.xm create fails to add vif PHYSDEV match rules for a domU with multiple network interfacesFormatting a disk on a Windows Server 2008/Vista 32 guest causes Windows to panic.Xen domain cannot be rebooted after restarting xendXen domain cannot be rebooted after restarting xend if it is configured with a mixture of tap and vbd disksxen network-bridge script doesn't work with SRCADDR option in default route interfaceWhen out of range hdX values are attached, guests misbehave/crashxm network-attach allow bogus mac addresses to be entered[RHEL5 Xen]: xm dump-core with 32-on-64 PV guest failsSMP 32bit RHEL5u1 and RHEL5u2 HVM domain might stop booting when start udev serviceSCSI problems on fullvirt guests with > 4Gb memtypo in python2.4/site-packages/xen/xend/sxp.pyscsi backend: make sure data is actually written to diskFEAT: support virtual SCSI disks >2TBUnable to shut down guest after attempting block-detach of guest boot devicexm dump-core does not truncate existing filesblktap qcow driver uses incompatible endianess vs qemu's qcow driverPV guest stops running when xm save failsxm console does not work when xm save failsFix missing blktap poll-on-aio supportRFE: Xen QEMU VNC server needs to support relative mouse VNC extensionPatch to provide INT13 LBA48 extensions to Xen HVM BIOS (boot off disks/images larger than 128GB)xen doesn't stop when entering runlevels 0, 1, or 6.libxenstore.so leaks memory on every @domainIntroduced eventpygrub abort with IndexError if default is set higher than number of boot entriesnetwork-bridge-bonding doesn't support 802.1q vlansXenD looses PVFB config info after PV guest rebootdefault value of cpu_weight changed from 256 to 1[Regression] xen HVM fsync performance for file-backed fs is in the toiletRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-94.el5.i386.rpm5438a474f282c1c258ed231801dfef22xen-3.0.3-94.el5.i386.rpm88eacbb5324c02ab21ba44a1036dc66fRHBA-2009:0140new package: libcmpiutillibcmpiutil is a library of utility functions for CMPI providers. Its goal
is to reduce the amount of repetitive work done in most CMPI providers by
encapsulating common procedures with more "normal" APIs. This includes
operations such as retrieving typed instance properties, standardizing method
dispatch and argument checking.
This library is required for the libvirt-cim package, which provides
support for libvirt in Red Hat Enterprise Linux 5.3.RHEL Virtualization (v. 5 for 32-bit x86)libcmpiutil-0.4-2.el5.i386.rpm7ab85c195a80768bf1b74d49750506a3libcmpiutil-devel-0.4-2.el5.i386.rpm7afbfdaa48ddd641c87ad812ec9b7a96RHEA-2007:0636python-virtinst enhancement updatepython-virtinst is a module to help in starting installations of Fedora/Red
Hat Enterprise Linux related distributions inside of virtual machines.
The new virt-manager release enables the management of inactive domains.
This requires an update to the supporting APIs in the python-virtinst used
for installation of guest virtual machines.
All users of python-virtinst should upgrade to this updated package, which
contains these enhancements.virt-install does not allow for HVM serial console captureUpdate to 0.103.0 to support requirements of virt-manager[RHEL5 U1] virt-install needs option to turn off auto-boot after installRHEL Virtualization (v. 5 for 32-bit x86)python-virtinst-0.103.0-3.el5.noarch.rpm6a4b294ae8063fabae79e85085d2a86dRHEA-2009:1302New package: perl-Sys-VirtThe new perl-SyS-Virt package provides an API for managing virtual machines
from Perl, using the libvirt library.
This new package reflects changes made for the release of Red Hat
Enterprise Linux 5.4.
Users of Red Hat Enterprise Linux 5 should upgrade to this updated package.off-by-1 buffer overflow in get_uuid_string() methodsRHEL Virtualization (v. 5 for 32-bit x86)perl-Sys-Virt-0.2.0-4.el5.i386.rpmdfd888260a1618e0a2cb6b3b5b1feff9RHEA-2007:0637virt-manager enhancement updateThe Virtual Machine Manager application is a desktop user interface for
managing virtual machines.
The new virt-manager provides UI for managing inactive guest virtual
machines, removing the need to use command line tools for starting guests.
It also adds support for NAT based networking.
Users of virt-manager are advised to upgrade to this updated package, which
adds these enhancements.preferences dialog uses wrong window typestring issuesAdd a "destroy" command to virt-managerSuggest a name for the disk image file when creating a new domainVM started with "maximum memory".Backspace doesn't work in serial consoleHVM save and restore fails with obscure error message"acpi" and "apic" can't be changed by user with virt-managerNo gui equivalent of xm createvirt-manager gui comes with several locale errorsUpdate to 0.4.0 to support inactive domain managementvirt-manager starts domU install even though error with duplicate name existsSpelling typo 'VirtAUization'RHEL Virtualization (v. 5 for 32-bit x86)virt-manager-0.4.0-3.el5.i386.rpm7e6105d0e8962a78b7f3cf2440f02aa1RHBA-2009:1285virt-manager enhancement and bug fix updateThe Virtual Machine Manager (virt-manager) package provides a graphical
tool for administering virtualized guests running on the Xen and KVM
hypervisors. The virt-manager application uses the libvirt API to manage
virtualized guests and hypervisors.
Bugs fixed in the updated virt-manager package include:
* Fully virtualized guests created with virt-manager are sometimes affected
by a bug that prevents the mouse from moving freely throughout the screen.
To work around this issue configure a USB tablet device for the guest with
virt-manager. (BZ#223805)
* The virt-manager help documentation was out-of-date and broken.
Presently, the documentation has been removed from the virt-manager to
address the various issue and the 'help' buttons and menu items have been
removed. Updated documentation is in development and may be available with
future releases. (BZ#448716, BZ#443628, BZ#460713)
* Running virt-manager in unprivileged mode listed guests twice when
connecting to remote hosts. If the remote host was disconnected and
reconnected the list would double again. Every guest entry, including the
duplicate entries could activate the guest. This issue is now resolved and
only the available guests will be listed for a remote host. (BZ#448885)
* virt-manager would hang when attempting to connect to a Xen hypervisor
with SSH. The updated virt-manager package has enhanced remote connection
awareness and this issue no longer presents. (BZ#484063)
* Adding or removing a device during the guest installation procedure
sometimes caused the guest to become unbootable. This behavior has been
fixed in the updated package and devices can be added or removed during the
installation. (BZ#472600)
* Changing memory allocation for running guests in virt-manager had no
effect. This issue is resolved in the updated package and memory changes
update correctly. (BZ#484314)
* Migrations with the virt-manager Migrate option failed due to incorrect
parameters being sent to libvirt. The correct parameters are sent in the
updated package. (BZ#509135)
This updated virt-manager package provides the following enhancements:
* virt-manager has been rebased to support the KVM hypervisor. (BZ#489374)
* Users can now add a sound for virtualized guests on the KVM hypervisor.
Sound cards are optional for virtualized guests. The only available and
default sound card device is an emulated AC97 device. (BZ#506035)
* the updated virt-manager package includes a storage management interface.
Access the storage management interface by selecting the
Edit->Host Details->Storage menu. The storage management interface manages
local and networked storage devices.
* Graphical guest consoles support resizing and scaling.
* Users can view and remove virtualized sound, serial, parallel, and host
devices from virtualized guests.
* Users can add sound cards and host devices to existing virtualized
guests.
* The disk and network device model can be selected when adding new
device to a virtualized guest.
* The default boot device for a virtualized guest can be selected in
virt-manager. (BZ#484068)
* VTd and PCI passthrough are now supported. The VT-d feature provides
hardware support for directly assigning physical PCI devices to a guest.
The main benefit of the feature is to improve the performance of guest I/O
to bare-metal levels for assigned PCI devices. Supported architectures for
VTd include: 32 bit x86, 64-bit Intel EM64T and 64-bit Intel Itanium 2.
(BZ#480521)
Users of virt-manager are advised to upgrade to this updated package, which
provide these bug fixes and enhancements.Mouse pointer hits an 'invisible wall'[documentation/virt-mananger] - code refers to documentation section "virt-manager-network", which is non-existenthelp doesn't show when running VM in privileged mode and without --no-forkvirt-manager UI not updated on disconnect/connect to remote hostvirt-manager Help Contents references New Machine button under File menu that does not exist.virt-manager doesn't update the inactive guest configvirt-manager hanged when creating a new vm through xen+ssh to localhostCould not boot from CDROMvirt-manager produces backtrace when setting domain memoryvirt-manager man page cruftWant ac97 sound, and want it by defaultThe network installation method is disabled under xen FV, but it still can be selected.Input the command "virt-manager -help" in the terminal.There will be a error messagevirt-manager does not find a default connection to kvm/qemuPrompt unsuitable after saving a virtual machine screenshotDon't setup a sound card by default in virt-managervirt-manager not transmitting a good uri to libvirt on migrationRHEL Virtualization (v. 5 for 32-bit x86)virt-manager-0.6.1-8.el5.i386.rpmf330cf2bfbb96a8787f83ef586736868RHBA-2008:0305xen bug fix and enhancement updateThe xen packages contain tools for managing the virtual machine monitor
in Red Hat Enterprise Linux Virtualization.
These updated packages fix the following bugs:
* hypervisor kernels were unable to see more than 3GB of memory.
* it was possible to create domains with a virtual block device used by
another domain.
* the "xm create" documentation has been updated to remove the "nics"
option.
* if errors occurred while extracting the kernel and initrd, stale vmlinuz
and initrd files were left in /var/lib/xen/.
* using USB tablet devices caused Microsoft Windows guests to hang.
* the network-bridge script was unable to handle alias addresses, leaving
networking in a broken state.
* the kernel and initrd files were not removed after running "xm create" in
"dry-run" mode.
* the para-virtualized framebuffer (PVFB) was not always updated after
installing a 32-bit guest on a 64-bit host.
* it was not possible to boot OpenSolaris guests.
* pygrub may have reported "unaligned access" messages for libfsimage
FAT16.
* running "xm dump-core" may have crashed xend on Itanium systems.
* in certain situations, when guests on Itanium systems were accessed via
VNC Viewer, "xen-vncfb unaligned access" messages were logged.
* pygrub incorrectly handled "elilo.conf" on Itanium systems, which may
have prevented Red Hat Enterprise Linux 5.1 guests from booting. Such
guests failed with a "Kernel panic - not syncing: Attempted to kill init!"
error.
* using the "xm reboot --all" command to reboot multiple domains may have
caused the guest operating systems to panic.
* configuring a fully-virtualized guest without "type=ioemu" still
presented a Realtek RTL8139 device to the fully-virtualized guest kernel,
when started with virt-manager or "virsh start". This caused PV-on-HVM to
fail.
* the crash utility could not analyze hypervisor vmcores that were created
on machines with more than 4GB of memory.
* it was not possible to use PCI pass-through.
* autoconfigured IPv6 addresses caused conflicts, which may have resulted
in packet loss, and commands such as "ping6" failing.
* a corrupt /var/lib/xenstored/tdb caused xenstored to die.
* the xm man page has been updated to clarify "xm vcpu-set" and "xm
mem-set" for fully-virtualized guests.
* it was not possible to use "virsh attach-disk" to attach a disk to a
running domain.
* the nvram file was not released after rebooting a HVM domain, which may
have prevented domain creation after multiple HVM domain reboots.
* the calculation of sockets_per_node was incorrect for NUMA nodes, causing
an incorrect "nr_cpus".
* guests with 100GB or more of memory could not be created on Itanium
systems.
* a hypervisor hang or a Dom0 panic occurred after HVM domain creation
failed due to a memory shortage.
* writes to a fully-virtualized device were always cached in Dom0,
possibly causing data integrity issues.
* running "reboot" from within a guest caused a traceback.
* with certain hardware, SMP guests were unable to start more than one CPU.
* "xentop" caused a segmentation fault on Itanium systems.
* the SDL window did not appear when creating para-virtualized guests.
* when using a JP keyboard, it was not possible to input certain
characters.
These updated packages add the following enhancements:
* crash dumps for Microsoft Windows guests.
* time stamps in the hypervisor log.
* support for NUMA. The virsh "freecell" command checks the available heap
memory of NUMA cells. The virsh "capabilities" command exposes NUMA
topology.
* for more secure remote management, PVFB now uses the QEMU backend.
Users of xen are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.xen - man pages need reviewed for accuracypygrub can leave stale vmlinuz and initrd data around on error[RHEL5.1][BUG][XEN] Windows guest hangs when using USB tablet device./etc/xen/scripts/network-bridge cannot handle aliased addressespygrub leaves initrd and vmlinuz images on dom0 after dryrun xm createPVFB fails to update when installing 32-bit FC-6 guest in 64-bit hostOpenSolaris domUs will not boot on RHEL5[RHEL5.1]: ia64 pygrub parses elilo.conf incorrectly/incompletelydom0 and ipv6 autoconf conflictReboot should recover from corrupted xenstored tdb[5.2] Cannot change the device by virsh attach-disk on RHEL5.1Switch Xen PVFB over to use QEMU instead of libvncserver & merge TLS patchesSMP FV xen guests failing to start more than 1 CPUxentop segmentation fault [regression]SDL window does not appear for pv guest[XEN][5.2][REG] PV domain can not use JP keyboard.RHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-64.el5.i386.rpmd6e1207182ee02c32e1a373a611750d8xen-devel-3.0.3-64.el5.i386.rpm5d529dc7592c99e8b3745844353e410cRHBA-2010:0206libvirt-cim bug fix and enhancement updateLibvert-cim is a Common Manageability Programming Interface (CMPI) based
Common Information Model (CIM) provider. It supports most libvirt
virtualization features and allows for the management of multiple
libvirt-based platforms.
This update addresses the following bug:
* the libvirt-cim.spec file included a "Requires: xen" line. Consequently,
selecting the libvirt-cim package in the KVM group during installation
installed the xen package as a dependency. For this update, that line was
removed and Xen is no longer installed automatically when libvirt-cim is
installed. (BZ#517579)
Note: libvirt-cim is an optional package in the KVM group and will not be
installed if only the KVM group is selected. The package has to be selected
manually from the optional packages list to be installed.
Note: a workaround for this issue existed. It required not selecting
libvirt-cim during installation and, after installation and registration of
the system to the Red Hat Network (RHN), installing an updated libvirt-cim
package from RHN. This workaround is no longer necessary.
This update also re-bases the package from version 0.5.5 to version 0.5.8.
This re-base addresses several minor bugs as noted in the ChangeLog
included in libvirt-cim.spec (available as part of the source rpm). The
re-base also adds the following enhancement:
* guest domain console support as well as support for storage pools and
network pools was added. (BZ#512233)
All users of virtualization tools that interact with libvirt, especially
those using CMPI and CIM, should install this updated package which
addresses this problem and adds this enhancement.[LTC 5.5 FEAT] libvirt-cim to include new features in RHEL 5.5 [201943]RHEL Virtualization (v. 5 for 32-bit x86)libvirt-cim-0.5.8-3.el5.i386.rpme1d5b18845b2198cb8c67b28643af76dRHBA-2010:0418xen bug fix updateXen is a high performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.
These updated xen packages fix the following bug:
* previously, some para-virtualized drivers returned a STORAGE_BUS_TYPE
(SCSI in this case) that was inconsistent with its PCI class code. They,
consequently, failed the Storage Query Property test (part of the Windows
Logo test). With this update, these drivers' class and sub-class were
changed from "Unclassified" and "Other" to "Storage" and "SCSI"
respectively. This is consistent with their STORAGE_BUS_TYPE and they now
pass the Storage Query Property test. (BZ#580398)
All Xen users, particularly those running guest instances of Windows,
should install this update, which addresses this issue.
Windows Logo testing likes its PCI classes to be consistentRHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-105.el5_5.2.i386.rpm0f1174b38383b01a77278b0d9f289987xen-devel-3.0.3-105.el5_5.2.i386.rpm3680d1dde276fd155ead7203508fed30RHBA-2009:1424libvirt bug fix updateThe libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remotely managing virtualized systems.
These updated libvirt packages fix the following bug:
* the PIT clock is the programmable interrupt timer clock, which triggers
interrupts at certain counts, and is the default clock for Red Hat
Enterprise Linux KVM guests. Guests which used the PIT experienced clock
drift due to interrupt re-injection. The "-no-kvm-pit-reinject" option has
now been added to the KVM command line, which solves potential clock drift
on Red Hat Enterprise Linux KVM guests. (BZ#517903)
All libvirt users are advised to upgrade to these updated packages, which
resolve this issue.Add -no-kvm-pit-reinject in qemu cmdline for RHEL guestsRHEL Virtualization (v. 5 for 32-bit x86)libvirt-devel-0.6.3-20.1.el5_4.i386.rpmafdfdb2ede98333da70a2ad2fa3c5ef4libvirt-python-0.6.3-20.1.el5_4.i386.rpmc0aa90dca6096f57145edf5973602cbblibvirt-0.6.3-20.1.el5_4.i386.rpm92923f62e14c689231c0282b5f81762eRHEA-2009:1270libvirt-cim bug fix and enhancement updateThe introduction of KVM virtualization in Red Hat Enterprise Linux 5.4
required that libvirt-cim be rebased and updated to support the new
hypervisor. Libvirt-cim is a CMPI CIM provider that lets you manage
multiple platforms and provides support for some libvirt features.
This package applies the fix for the following bug:
* libvirt-cim would generate an incorrect boot tag for fully virtualized
Xen guests, which would cause a 'Missing boot device' error. Boot tags will
now generate in the form <boot dev='hd'> instead of <boot>hd</boot>, and
guests will be able to start normally. (BZ#503724)
This package also adds the following enhancements:
* KVM virtualization in Red Hat Enterprise Linux, as mentioned above,
requires an updated version of libvirt-cim to support the new
hypervisor. libvirt-based CIM providers have been updated to enable
support for third-party system management tools for Xen and KVM.
(BZ#474681)
* Red Hat Enterprise Linux 4 introduced higher permission sensitivity to
directory creation when installing packages. When the root's umask was
changed prior to installation, and a package did not explicitly define
directory permissions for a file, the installer would create directories
based on the umask of the user who ran the installation. This could result
in an 'Unowned Directory' error. libvirt-cim now includes full permission
information, so directories are set up correctly during installation.
(BZ#481810)
All users are advised to upgrade to this enhanced package, which resolves
these issues.[LTC 5.4 FEAT] libvirt based CIM providers for virtualization [201163]Xen Fully Virt domain may not startRHEL Virtualization (v. 5 for 32-bit x86)libvirt-cim-0.5.5-2.el5.i386.rpm1b2eec622d4f2fcfd02315bbbb652b3cRHEA-2009:1269libvirt bug fix and enhancement updateThe libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remotely managing virtualized systems.
These updated packages upgrade the libvirt library for Red Hat Enterprise
Linux 5 to upstream version 0.6.3, which contains a large number of
enhancements and bug fixes over the previous version. Importantly, with
this libvirt update, Red Hat Enterprise Linux 5.4 is the first release to
provide support for the KVM hypervisor. Also present in this update are PCI
pass-through ability and PCI hot plug support. See the "enhancements"
section below for details. (BZ#475821)
For a more complete list of changes and bug fixes in libvirt releases,
refer to the link in the "References" section of this errata.
These updated packages fix the following notable bugs:
* the "virsh" and "xm" commands passed incorrectly passed the option
"type=vbd" when either attaching or detaching TAP devices, which caused the
command to fail. With this update, the correct type, "type=tap", is passed
when TAP devices are attached or detached. (BZ#475791)
* attempting to create a domain on a node using an iSCSI volume pool
managed by libvirt failed with this error message:
libvir: Remote error : socket closed unexpectedly
error: Failed to create domain from create_guest.xml
This has been fixed in these updated packages so that creating guests on an
iSCSI volume pool succeeds as expected. (BZ#483310)
* after a failure to start a KVM domain, libvirt occasionally reported that
it was unable to connect to the hypervisor, with the result that "virsh"
commands could not be run again until a connection was reestablished. With
this update, this situation is prevented from occurring. (BZ#483835)
* occasionally, libvirt lost track of running domains, the command "virsh
list" did not list those domains, and pid files still existed for the
processes representing those domains. A fix to the libvirt event loop now
ensures that libvirt is able to keep track of all running domains on the
host. (BZ#499250)
* due to a domain ID-handling error, the command "virsh destroy
[domain-id]" could potentially terminate domains with IDs similar to the
target. This has been corrected so that "virsh destroy [domain-id]"
terminates only the target domain. (BZ#500158)
* running the command "virsh dominfo [domain-id]" to acquire information
about a running Xen domain resulted in this error message:
error: this function is not supported by the hypervisor:
virNodeGetSecurityModel
This update fixes the dominfo subcommand so that it does not return an
error message if the security model API is unimplemented. (BZ#506688)
* right-clicking on a running domain in the virt-manager application and
then choosing Shutdown -> Force Off incorrectly caused that domain ID to
disappear from the virt-manager list of VMs. In addition, domains created
with the virt-manager or virt-install applications were not listed in the
GUI window until virt-manager was restarted or the newly-created guest was
started. This issue was related to inotify support and has been fixed in
these updated packages. (BZ#508278)
In addition, these updated packages provide the following enhancements:
* PCI pass-through is a virtualization-related ability that is enabled by
AMD's IOMMU and Intel's VT-d technologies. With PCI pass-through, PCI
devices can be "passed through" the hypervisor (that is, bypassing it and
locking it out) to an unprivileged domain, thereby allowing near-native
performance of hardware devices, such as network cards, in guest domains.
With this update, PCI pass-through is enabled for both Xen and KVM virtual
machines. (BZ#471156, BZ#513317, BZ#496925, BZ#481757, BZ#481747)
Users are advised to upgrade to these updated libvirt packages, which
resolve these issues and add these enhancements.Invalid config files and ordinary text files in /etc/xen cause libvirt error messageslibvirt error message (virt-manager) "out of memory/invalid argument in __VirtGetDomain" on guest save/migrationvirsh does not print a proper error when trying to connect to console on remote vmUsing `virsh` does not properly parse vifname parameter from domU configuration!Feature Request: Inclusion of serial port redirection to a file in rhel[RHEL5.4]: libvirt/ virsh passes incorrect type=vbd when detaching TAP devicesvirsh domblkstat gives wrong error message when the target device doesn't exist in the guestvirsh version - libvir: QEMU error : internal error Cannot find QEMU binaryCreating new virtual networks via virt-manager causes SELinux violationsTHe <clock offset='localtime'/> is not honoured for RHEL-5 Xenvirsh migrate is not allowing for authentication credentials when connecting to the destinationvirsh save $shutted-off-domain will get invalid domain pointer in no domain with matching id -1libvir: error: invalid connection pointer in virConnectCloselibvir: error: this function is not supported by the hypervisor: virNodeDeviceLookupByNamethree methods having the same name createXML() in the libvirt.pylibvirt: a pool with the wrong config was defined in pool list[Various 5.4 feat] Support NPIV in libvirtvirsh detach-device ''Segmentation fault' errorRHEL 5.4 vt-d: libvirt's qemu driver interprets the <hostdev> "managed" attribute incorrectly'virsh destroy' destroys multiple VMsRHEL5.4: libvirt QEMU driver is using old pci_add/pci_del syntaxlibvirtd crashes on tls connectionErrors reported after setting network bridge autostart for second time.virsh freecell outputs incorrect unit of measurementlibvirt must look in /usr/libexec for qemu-kvm binary as priority over /usr/binStorage driver is built without QCow2 support due to missing qemu-img BuildRequiresdestroy node device and create node device from xml has "Segmentation fault"Remote driver is broken for automatic TLS URIs, and does not report certificate file problemsvirsh dominfo prints an error on every invocation with Xen driverA running vm will disappear after forced offnodedev-dumpxml can hang libvirtdPCI passthrough with kvm guest cause libvirtd deadlibvirt does not properly detect FLR supportRHEL Virtualization (v. 5 for 32-bit x86)libvirt-0.6.3-20.el5.i386.rpmd16d07ea530f1dec620f8520ca69f5a4libvirt-devel-0.6.3-20.el5.i386.rpm0b8b0150508cc8df0d91e82ae40773dclibvirt-python-0.6.3-20.el5.i386.rpm5c66006b73ab9875a8587ea21b145600RHBA-2009:1412python-virtinst bug fix and enhancement updateThe python-virtinst package contains virtinst, a module to help start
installations of Red Hat Enterprise Linux or Fedora inside a virtual
machine. It supports para-virtualized and fully-virtualized guests. As
well, the python-virtinst package contains a script, virt-install, which
uses virtinst in a command-line mode.
This update addresses the following bugs:
* to install a virtual machine using a remote ISO, the "--cdrom" argument
can take a Uniform Resource Indicator (URI) value. Previously this did not
work, instead failing with a "Cannot create storage for cdrom device error.
The re-base to version 0.400.3 (see below) includes a fix for this: giving
a remote URI value to the "--cdrom" argument now works as expected.
(BZ#506714)
* if installation of a virtual instance of Red Hat Enterprise Linux or
Fedora took longer than the time specified by the "--wait" option,
virt-installs exited and printed the error "Installation has exceeded
specified timelimit. Aborting." Since the installation itself is not
affected, "Aborting" has been edited to the clearer "Exiting application".
(BZ#476717)
As well, this updated package includes the following enhancements:
* when creating a new guest, the default sound hardware was previously
es1370 with the user able to select pcspk and sb16 as alternatives. For
this update, ac97 has been added as an option for both Xen and KVM virtual
machines. As well, for KVM virtual machines, ac97 is now the default choice
(for Xen virtual machines the default remains es1370). (BZ#508747)
* to support KVM on Red Hat Enterprise Linux 5, python-virtinst was
re-based from version 0.300.2 to version 0.400.3. (BZ#489375)
Along with KVM support, this re-base adds multiple new features, including:
- the new "virt-convert" tool. virt-convert allows conversion between
different virtualization configuration file formats. Note: this currently
only supports converting between vmx and virt-image formats.
- virt-install support for remote guest installations.
- the new "--disk" option for virt-install. This allows many more storage
attributes via the command line, as well as libvirt storage specific
information.
- the new "--sound" option for virt-install. This allows sound devices to
be attached to guest operating systems.
- the new "--hostdev" option for virt-install. This allows a physical host
device to be attached to guest operating systems.
- the new "--import" option for virt-install. This allows for the creation
of a guest from an existing disk image, with no installation phase
required.
- the virt-* tools no longer run interactively by default. The user must
pass the --prompt option to force this mode. (Messages to STD OUT inform
users familiar with the previous default of this new setting.) This was
done to make the tools more friendly for scripting purposes.
Users of python-virtinst are advised to upgrade to this updated package,
which fixes these issues and provides these enhancements.RFE: Better error message is needed for --wait timeouts.Cannot install an HVM guest from a CDROM on a remote URIWant ac97 sound, and want it by defaultRevert to previous behavior wrt unicode gettext and help messagesRHEL Virtualization (v. 5 for 32-bit x86)python-virtinst-0.400.3-5.el5.noarch.rpmf06c59b385175e48503527c7d9b66104RHSA-2009:1472Moderate: xen security and bug fix updateXen is an open source virtualization framework. Virtualization allows users
to run guest operating systems in virtual machines on top of a host
operating system.
The pyGrub boot loader did not honor the "password" option in the grub.conf
file for para-virtualized guests. Users with access to a guest's console
could use this flaw to bypass intended access restrictions and boot the
guest with arbitrary kernel boot options, allowing them to get root
privileges in the guest's operating system. With this update, pyGrub
correctly honors the "password" option in grub.conf for para-virtualized
guests. (CVE-2009-3525)
This update also fixes the following bugs:
* rebooting para-virtualized guests sometimes caused those guests to crash
due to a race condition in the xend node control daemon. This update fixes
this race condition so that rebooting guests no longer potentially causes
them to crash and fail to reboot. (BZ#525141)
* due to a race condition in the xend daemon, a guest could disappear from
the list of running guests following a reboot, even though the guest
rebooted successfully and was running. This update fixes this race
condition so that guests always reappear in the guest list following a
reboot. (BZ#525143)
* attempting to use PCI pass-through to para-virtualized guests on certain
kernels failed with a "Function not implemented" error message. As a
result, users requiring PCI pass-through on para-virtualized guests were
not able to update the xen packages without also updating the kernel and
thus requiring a reboot. These updated packages enable PCI pass-through for
para-virtualized guests so that users do not need to upgrade the kernel in
order to take advantage of PCI pass-through functionality. (BZ#525149)
All Xen users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the xend service must be restarted for this update to take
effect.[REG][Xen][5.4] PV domains may crash after rebootAdd grub.conf password protection support to pygrubDomain goes missing from xm list when rebootedPCI-Paththrough with PCI-Card does not work anymore with RHEL5.4CVE-2009-3525 Xen: PyGrub missing support for password configuration commandRHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-94.el5_4.1.i386.rpm760cf5b57418fce7840f78484b37eb61xen-devel-3.0.3-94.el5_4.1.i386.rpmdc09065aacc7faecc87eafbc5d02ee48RHEA-2008:0371python-virtinst enhancement and bug fix updateThe python-virtinst package contains virtinst, a module to help start
installations of Red Hat Enterprise Linux or Fedora inside a virtual
machine. It supports para-virtualized and fully-virtualized guests. As
well, the python-virtinst package contains a script, virt-install, which
uses virtinst in a command line mode.
This updated package provides the following enhancements:
* python-virtinst has been upgraded to a newer version, (0.300.2).
* the virt-install command now provides a manual page.
* virt-install is now able to install Fedora 8 guests.
* CPU pinning is now supported when new guests are created with the
'--cpuset' option.
* virt-install now gives a warning if creating a guest would overwrite an
existing storage file.
* improved error messages when virt-install is not able to install a
virtualized guest via a URL.
* support for the --noreboot option has been added to virt-install.
* virt-install is now enabled to log messages.
In addition, this updated python-virtinst package provides fixes for the
following bugs:
* libvirt would emit extraneous error messages when running virt-install.
* virt-install was unable to create Xen instances of Fedora rawhide.
* special characters were unescaped in file names represented in XML,
resulting in a failure to create guests.
* problems with character-escaping with XML.
* several formerly-ambiguous error messages have been clarified.
* virt-install is now able to install virtual machines from Satellite servers.
* a VirtualDisk object is now built using the CD-ROM path passed to
virt-install in order to reuse already-present validation.
* python-virtinst now checks and warns the user if the user attempts
installation to regular files already used by another domain.
* a bug which caused the rejection of hyphenated virtual machine names has
been fixed.
Users are advised to upgrade to this updated python-virtinst package, which
resolves these issues and adds these enhancements.
Changes to python-virtinst have caused virt-install to reject a VM name that contains a hyphenuncaught error in virt-install at virtual CD image questionvirtinst - check if image file is in use by another domainadd persistent logging to virt-installvirt-install lacks XML escaping of extra-argsvirt-install cannot install from tree provided by Satellite serverambigous error messagevirt-manager will not install F8 via httpAdd fedora 8 label to allow for full virt installSpecial characters are not escaped in filenames for domain XMLRebase to 0.300.2 to support virt-manager remote managementvirt-clone is broken due to input validation mistake[RHEL5] virt-install: error: no such option: --norebootSatellite installs broken again: global name 'FedoraImageStore' is not definedvirt-install is now interactiveCannot create xen rawhide instanceEvery install, libvirt error messages are shown on virt-installRHEL Virtualization (v. 5 for 32-bit x86)python-virtinst-0.300.2-8.el5.noarch.rpmcb3af8d93cede64e9e6348a7f132f06aRHBA-2009:1514xen bug fix updateXen is a high performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.
These updated xen packages fix the following bug:
* issuing an "xm info" command or any virsh commands caused xend to leak
memory. As well, xend's memory consumption grew very quickly in combination
with cluster suite, which uses virsh to monitor running guests. This update
fixes the underlying errors in the PyList_Append and PyDict_SetItemString
functions that caused the memory leaks. (BZ#528163)
All xen users are advised to upgrade to these updated packages, which
resolve this issue. Note: after installation, the xend service must be
restarted for this update to take effect.sluggish RHEL5.4 dom0 in Dev Virt ClusterRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-94.el5_4.2.i386.rpm1dc6e459048259c0bed22646437fcd84xen-3.0.3-94.el5_4.2.i386.rpm27b0b86b90cb60d071bc96dfbff67a06RHSA-2009:0003Moderate: xen security and bug fix updateThe xen packages contain the Xen tools and management daemons needed to
manage virtual machines running on Red Hat Enterprise Linux.
Xen was found to allow unprivileged DomU domains to overwrite xenstore
values which should only be changeable by the privileged Dom0 domain. An
attacker controlling a DomU domain could, potentially, use this flaw to
kill arbitrary processes in Dom0 or trick a Dom0 user into accessing the
text console of a different domain running on the same host. This update
makes certain parts of the xenstore tree read-only to the unprivileged DomU
domains. (CVE-2008-4405)
It was discovered that the qemu-dm.debug script created a temporary file in
/tmp in an insecure way. A local attacker in Dom0 could, potentially, use
this flaw to overwrite arbitrary files via a symlink attack. Note: This
script is not needed in production deployments and therefore was removed
and is not shipped with updated xen packages. (CVE-2008-4993)
This update also fixes the following bug:
* xen calculates its running time by adding the hypervisor's up-time to the
hypervisor's boot-time record. In live migrations of para-virtualized
guests, however, the guest would over-write the new hypervisor's boot-time
record with the boot-time of the previous hypervisor. This caused
time-dependent processes on the guests to fail (for example, crond would
fail to start cron jobs). With this update, the new hypervisor's boot-time
record is no longer over-written during live migrations.
All xen users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. The Xen host must be
restarted for the update to take effect.timer stops running after live migrate or dom0 reboot & save/restore of a Xen guestCVE-2008-4405 xen: Multiple unsafe uses of guest-writable data from xenstoreCVE-2008-4993 xen: insecure temporary file use in qemu-dm.debugRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-64.el5_2.9.i386.rpme8d8b603ae5cce7951a2cca85a9f77f7xen-3.0.3-64.el5_2.9.i386.rpm33320d5f8607703e891c7be3bb3049c6RHBA-2010:0222libcmpiutil bug fix and enhancement updatelibcmpiutil provides a convenient API for performing common tasks with
different CMPI providers.
* the libcmpiutil package is used by the libvirt-cim package. An update to
the libvirt-cim package requires this update. (BZ#540843)
Users are advised to upgrade to this updated libcmpiutil package, which
resolves these issues and adds these enhancements.[LTC 5.5 FEAT] libcmpiutils update in RHEL 5.5 [201943]RHEL Virtualization (v. 5 for 32-bit x86)libcmpiutil-devel-0.5.1-1.el5.i386.rpm029a72e0d9414ed6d012dd2d9792dcaclibcmpiutil-0.5.1-1.el5.i386.rpm7cee4f8d7ae5b24fa0f1e79903544c86RHBA-2008:0198virt-manager bug fix updateThe Virtual Machine Manager application is a desktop user interface for
managing virtual machines.
The recent dbus security errata, RHSA-2008:0159, constrained the ways in
which D-Bus objects can be called. This prevented virt-manager from
speaking to the HAL to obtain information about host network and disk
devices. For example, when creating a new guest, no network devices were
listed when the shared physical device option was selected. As well, this
may have prevented CD-ROM devices from being listed. In this updated
package, virt-manager has been adapted to use an alternative way to call
HAL APIs, which resolves this issue.
Users of virt-manager are advised to upgrade to this updated package, which
resolves this issue.No network devices for "Shared physical device" optionRHEL Virtualization (v. 5 for 32-bit x86)virt-manager-0.4.0-3.el5_1.1.i386.rpmc7ad933c9c5faf37d648552df4e7d7acRHBA-2009:1299virt-viewer bug fix updateVirtual Machine Viewer provides a graphical console client for connecting
to virtual machines. It uses the GTK-VNC widget to provide the display, and
libvirt for looking up VNC server details.
This update addresses the following two bugs:
* the "-w" or "--wait" options (for "wait for domain to start") returned an
"invalid option" error rather than waiting for the nominated domain to
start. (BZ#444024)
* when a guest was started up, running "virt-viewer --wait [guestname]" did
not result in notification of the guest's changed status and did not result
in virt-viewer connecting to the newly-started guest. (BZ#444028)
All Virtual Machine Viewer users should install this updated package which
fixes these two problems.-w option is not recognized in virt-viewer--wait option in virt-viewer doesn't connect when guest is startedRHEL Virtualization (v. 5 for 32-bit x86)virt-viewer-0.0.2-3.el5.i386.rpm91e820c65a6f3289f419d72946713d99RHEA-2007:0635xen enhancement updateThe xen package contains the Xen hypervisor and Xen tools that are needed to
run virtual machines on x86 systems, together with the kernel-xen* packages.
The Xen hypervisor has been updated to Xen 3.1, which is not ABI compatible
with the earlier Xen 3.0.3 hypervisor. The new Xen userspace has support for
dealing with the Xen 3.1 hypervisor ABI format. The packages also enable
save and restore with fully virtualized guest domains.
All xen users should upgrade to these updated packages, which contain these
enhancements.xenconsoled should persistently log PV console outputHVM serial console hangs in grubXenD HTTP service serializes all requestsPython error when specifying vnc portlibxc does not propagate errors during domain creation back to XenDKernel does not re-activate paravirt console mapping during resume/migrationblktap should error out if disk image is not found prior to starting domainvncfb does not run on IA64Windows XP install requires F5 for HAL selectionHVM guests limited to 2G memoryPAE 4GB bug in hypervisor when using HVM guests with > 4 GB ramxend forgets pvfb configuration on restart[RHEL5] Xen restore tries to balloon to "maxmem" if specified in the config fileFEAT: RHEL5.1 VT-i supported as ProductFully virtualized virt-install fails from a read-write NFS shareUseless xen-vncfb process is created for fully virtualized domainsIA64 Fully virtualized support fails with "Invalid Argument"PVFB backend fails to terminate when frontend vanishes earlyHVM: QEMU leaks virtual disk file descriptors to network script causing SELinux AVCsHotplug scripts report errors badlyQEMU file descriptor leak causes SELinux errors when starting HVM domainpermission of /var/log/xen/xend-debug.log wrongGuest Reboot Fails, 30 Second Shutdown Timeoutnetwork-bridge fails on some machinesUpdate userspace to work against 3.1.0 hypervisor ABIRace in vfb/vkbd device setupxen-vncfb segfaultRunning i386 FC6 with PVFB causes Dom0 kernel panicstopping xend with running domUs destroys xen systemPackage description seems wrongNetwork device doesn't work in 32-bit Vista HVM guestsPrompted for VNC password after live migrationxm create complains about keymap option in vfb[]Live migration of HVM/Fully-Virt guests crashes target host/dom0RHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-41.el5.i386.rpm0ef86753739ed5853a789a98af89fdd8xen-3.0.3-41.el5.i386.rpmd2a378e5a813b5af4a93ab957572b0b2RHBA-2007:0611Virtualization_Guide enhancement updateThe Virtualization_Guide package provides system administration, concepts,
procedures and reference material for configuring Virtualization on Red
Hat Enterprise Linux.
This package contains content updates to support new features in Red Hat
Enterprise Linux 5.1.
Users should upgrade to this updated package, which provides this enhancement.section 18.7.6 where it talks about SELINUX with XENchange folder 3.1. Performing a Core DumpDocumentation about using VNET with Xen incompleteECS: Virtualization_GuideRHEL Virtualization (v. 5 for 32-bit x86)Virtualization-ru-RU-5.1.0-12.noarch.rpmc5aab67975de3fcad5d5c9b479118d20Virtualization-hi-IN-5.1.0-12.noarch.rpm0cc59c070e4448882195be327e842b6bVirtualization-zh-CN-5.1.0-12.noarch.rpm95ed8e8309ed474c5cb56bffb606220dVirtualization-ml-IN-5.1.0-12.noarch.rpmcd26af1170e027bf1793f4c9f0d22ce9Virtualization-es-ES-5.1.0-12.noarch.rpm2e3e63e25e1deb0d824218f4d160f914Virtualization-mr-IN-5.1.0-12.noarch.rpmeae125b127d87f78abe7d0360a49d339Virtualization-zh-TW-5.1.0-12.noarch.rpm0d0fc8bf06d91c0fc242004bde18a851Virtualization-ko-KR-5.1.0-12.noarch.rpmfb4bbb1f434bade311fd05a560676afbVirtualization-pt-BR-5.1.0-12.noarch.rpmd4fdaaa3e3c3ea27aac21154f59975f4Virtualization-fr-FR-5.1.0-12.noarch.rpm00baa8d2e5f0263d833502c9767da1b6Virtualization-ja-JP-5.1.0-12.noarch.rpma951790dc18c0e83baa9177bbf11dc11Virtualization-en-US-5.1.0-12.noarch.rpm37cd9e7aa0725fa4311421fdf42d248aVirtualization-de-DE-5.1.0-12.noarch.rpmbb493b58ef234b1506beaea4ef6a1592Virtualization-bn-IN-5.1.0-12.noarch.rpm4343b6c97cf8c9e5b95767b474773f84Virtualization-or-IN-5.1.0-12.noarch.rpm49955ec1c68e90e753b77978bb4f852bVirtualization-pa-IN-5.1.0-12.noarch.rpm54718cf8135d713fcb0cc494652d3e07Virtualization-te-IN-5.1.0-12.noarch.rpm99c67aae8cd19347f735250086ab2434Virtualization-gu-IN-5.1.0-12.noarch.rpm41f0fb06c27629e13a5bfc60822dab77Virtualization-it-IT-5.1.0-12.noarch.rpm2a60d82ea33b004fca16b17353bb5b70Virtualization-si-LK-5.1.0-12.noarch.rpmc02c8e1c2b5f06e7de226f6c31167b95Virtualization-as-IN-5.1.0-12.noarch.rpmcc4271eef4836655a6d79de09bb5e5b2Virtualization-ta-IN-5.1.0-12.noarch.rpmd700eef28a99bf06d1e6ff9aff9407abVirtualization-kn-IN-5.1.0-12.noarch.rpm21b6c83bdc27266722659d302e986a3bRHBA-2010:0282python-virtinst bug fix and enhancement updatepython-virtinst is a module that helps build and install libvirt based
virtual machines.
This updated package addresses the following issues:
* When installing a KVM Windows guest with virt-install, QEMU would not
immediately recognise the installation. An error message would appear,
despite a successful installation. A minor delay has been added to allow
the correct information to be gathered, and the incorrect error message
no longer appears. (BZ#498237)
* An unsupported --prompt option was listed in the --help output for
virt-image. When virt-image --prompt was run, an error message would
print. The --prompt option has been removed from the --help output.
(BZ#503721)
* cow, qcow and qcow2 were not listed in the virt-convert format
whitelist, although they were supported. An unknown disk format error
would print for each format when virt-convert was run from a VMware
virtual machine to a virt-image. cow, qcow and qcow2 are now listed.
BZ#506927)
* virt-install would fail when re-installing a virtual system using an
.img file that had been moved or deleted, instead of re-creating the
guest image. The error was found to be spurious characters in the image
paths ('/'). Code has been corrected in python-virtinst to prevent this
error. (BZ#511925)
* By default, virtual disks are not opened with O_DIRECT. This meant
data would sometimes be cached twice: once inside the virtual machine,
and once outside. Users had to manually add
<driver name='qemu' cache='none'/> to the virtual machine definition
to prevent double caching. The default cache mode of QEMU and KVM guests
is now set to "none", which prevents inconsistent disc states.
(BZ#512072)
* The --disk option of virt-install was not compatible with the --prompt
option, and caused error messages to print when they were used together.
The interaction between these two options has been adjusted, and --disk
can now be used with --prompt successfully. (BZ#516129)
* When --wait is specified as 0, virt-install should begin the installation
process and exit the console. However, a syntax error in the code caused
virt-install --wait to perform as if it was not specified, and the console
must be closed manually. The syntax error has now been corrected, and if
--wait=0, the installation process will begin and close the console.
(BZ#517081)
* When running virt-install --prompt --nographics, if the disk size was
too big for the available diskspace, a badly formatted error message would
print. The error message syntax has been corrected, and the user prompt
now appears on a new line beneath the message. (BZ#523767)
* virt-install reported that the installation was still in progress after
the installation was complete and the guest machine was being rebooted.
The post installation error catching and reporting has been improved. The
guest state is now reported accurately. (BZ#545837)
* An os dictionary entry has been backported into this release. Users no
longer need to use virtio26 to enable virtio support for guests. This
entry can be selected in virt-manager or via virt-install --os-variant.
(BZ#547380)
* libvirt was, at times, unable to start guest systems when installing
under a minor load, and the install would fail. There were memory problems
if another process was writing to disk simultaneously, and virt-install
was misreading nonsparse disk images. This fix modifies the libvirt
timeout manager to better cope with shared I/O conditions an adds the
0_DSYNC flag to python-virtinst to manage nonsparse disk reading.
(BZ#558855)
* Previously, a patch was added to virtinst to avoid non-sparse volume
creation, because libvirt did not drop the pool lock while allocating.
However, the libvirt version in this release does not have this issue.
The patch has been removed and virt-install no longer ignores
--nonsparse when creating an image inside libvirt's storage pool.
(BZ#569339)
Users are advised to upgrade to this updated python-virtinst package which
resolves these issues.virt-image don't support --prompt optionsvirt-convert don't support qcow, qcow2, 'cow', these three disk formats.virt-install fails on creation of disk image after previous creation/deletionDefault caching behavior of KVM VM's--disk option gets confused about DISKOPTS when invoked together with --prompt.Badly formatted error message in virt-install[RHEL 5.5] virt-install reports installation still in progress even though it's done.virtinst: Add rhel5.4+ os dictionary entry/distribution/virt/install fails with libvirtError: internal error unable to start guest: char device redirected to /dev/pts/1virt-install ignores --nonsparse when creating an image inside libvirt's storage poolRHEL Virtualization (v. 5 for 32-bit x86)python-virtinst-0.400.3-9.el5.noarch.rpm6105d7af490975a56d1a8022fbb97bbbRHBA-2010:0251perl-Sys-Virt bug fix updateThe Sys::Virt module provides a Perl XS binding to the libvirt virtual
machine management APIs. This allows machines running within arbitrary
virtualization containers to be managed with a consistent API.
This update addresses the following issues:
* a number of calls available in the C API, including
virStorageVolLookupByKey, virStorageVolLookupByName, and
virStorageVolLookupByPath, did not contain Perl bindings. As a result,
these storage functions were unavailable when using Perl-based tools for
virtual machine management. This update adds the missing calls to the Perl
API, and Perl-based management of virtual machines is now possible.
(BZ#519647)
* the 'message' subroutine of Error.pm returned an error code instead of an
error message. As a consequence, error conditions that required a textual
error message instead received an alpha-numeric error code. The 'message'
subroutine has been amended to return a textual message, and error
conditions now produce a more informative error description. (BZ#525091)
* Sys::Virt did not document the 'flags' parameter used by several methods,
including the following:
* $vmm->num_of_node_devices
* $vmm->list_node_device_names
* $vmm->find_storage_pool_sources
* $dom->core_dump
* $dom->reboot
* $dom->block_peek
* $dom->memory_peek
* $dom->get_autostart
* $pool->refresh
* $pool->build
* $pool->delete
Since the 'flags' parameter is currently unused, the parameter and its
default value were not mentioned in the methods' descriptions. This could
cause certain operations that referenced the 'flags' parameter to fail with
a usage error. The 'flags' parameter is now documented as an optional
parameter that defaults to a value of zero if it is omitted. Usage errors
no longer occur when using the methods as documented. (BZ#519712)
* the description of the $dom->reboot method made reference to a list of
&Sys::Virt::Domain::REBOOT_* constants for use with the 'flags' parameter.
However, since the 'flags' parameter is not currently used, the reboot
constants were not included in the document. This could cause confusion
when implementing the $dom->reboot method. The reference to the reboot
constants has been removed from the documentation, and the correct usage
of the $dom->reboot method is now clearer. (BZ#543878)
All users using Perl or Perl-based tools to do virtual machine management
should install this updated package which fixes these bugs.virStorageVolLookupBy* not implementedflags argument of $pool->refresh() undocumentedmessage subroutine has a error in Error.pm[RHEL5] documentation bug - mention about non-existent REBOOT_* flagsRHEL Virtualization (v. 5 for 32-bit x86)perl-Sys-Virt-0.2.0-6.el5.i386.rpm80fe195dee7b0b708f654bb42f062555RHSA-2009:0382Moderate: libvirt security updatelibvirt is a C API for managing and interacting with the virtualization
capabilities of Linux and other operating systems. libvirt also provides
tools for remotely managing virtualized systems.
The libvirtd daemon was discovered to not properly check user connection
permissions before performing certain privileged actions, such as
requesting migration of an unprivileged guest domain to another system. A
local user able to establish a read-only connection to libvirtd could use
this flaw to perform actions that should be restricted to read-write
connections. (CVE-2008-5086)
libvirt_proxy, a setuid helper application allowing non-privileged users to
communicate with the hypervisor, was discovered to not properly validate
user requests. Local users could use this flaw to cause a stack-based
buffer overflow in libvirt_proxy, possibly allowing them to run arbitrary
code with root privileges. (CVE-2009-0036)
All users are advised to upgrade to these updated packages, which contain
backported patches which resolve these issues. After installing the update,
libvirtd must be restarted manually (for example, by issuing a
"service libvirtd restart" command) for this change to take effect.CVE-2008-5086 libvirt: missing checks for read-only connectionCVE-2009-0036 libvirt: libvirt_proxy buffer overflowRHEL Virtualization (v. 5 for 32-bit x86)libvirt-devel-0.3.3-14.el5_3.1.i386.rpm286078e3603347e1d3143981edaf1439libvirt-0.3.3-14.el5_3.1.i386.rpme50072ce3a0b192fb94042c667c591ablibvirt-python-0.3.3-14.el5_3.1.i386.rpm86e8779f369913f62eb792656c5fb0b7RHBA-2010:0294xen bug fix and enhancement updateThe xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.
These updated packages include numerous bug fixes for and enhancements to
the xen packages. Space precludes documenting each of these changes in
this advisory and users are directed to the xen chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technica
l_Notes/xen.html
All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which fix the bugs and add the enhancements noted in the Red Hat
Enterprise Linux 5.5 Technical Notes. The system must be rebooted for this
update to take effect.Service xendomains output is confusing and uglyRFE: [CRM#1806336] Add 'default-vcpus' / 'max-vcpus' style options to Xenguest reports repeatedly ATA erroradd manufacturer and product name info to guest SMBIOSCommand "virsh save <domain> <file>" hang when trying to save a paused domain on xensave/restore will reset cpu weight for the domainDomain goes missing from xm list when rebooted'xm pci-list' fails on PV guest[RHEL5.4 Xen]: Running "xm pci-list-assignable-devices" before modprobing pciback leads to errorSalvage bug fixes from reverted xen-qemu-aio-scsi.patchImplement support in xen domain builder for bzImage lzma and bzip2 compressionAdd grub.conf password protection support to pygrubPCI-Paththrough with PCI-Card does not work anymore with RHEL5.4rename-restart behavior is brokenUnable to live-migrate two domUs at the same timeBlock assignment of devices below non-ACS switchxm-create incorrectly states a vm is in use, when it isn'tBackporting MSI-X mask bit accelerationMigration not working on some machines after xen-3.0.3-95.el5 disable paused domain save patchRHEL Virtualization (v. 5 for 32-bit x86)xen-3.0.3-105.el5.i386.rpm8021d14767766b98c8cd7e1edc88f562xen-devel-3.0.3-105.el5.i386.rpm5c6a8d28573e68b4c8784db614401223RHSA-2008:0892Important: xen security and bug fix updateThe xen packages contain tools for managing the virtual machine monitor in
Red Hat Virtualization.
It was discovered that the hypervisor's para-virtualized framebuffer (PVFB)
backend failed to validate the frontend's framebuffer description properly.
This could allow a privileged user in the unprivileged domain (DomU) to
cause a denial of service, or, possibly, elevate privileges to the
privileged domain (Dom0). (CVE-2008-1952)
A flaw was found in the QEMU block format auto-detection, when running
fully-virtualized guests and using Qemu images written on removable media
(USB storage, 3.5" disks). Privileged users of such fully-virtualized
guests (DomU), with a raw-formatted disk image, were able to write a header
to that disk image describing another format. This could allow such guests
to read arbitrary files in their hypervisor's host (Dom0). (CVE-2008-1945)
Additionally, the following bug is addressed in this update:
* The qcow-create command terminated when invoked due to glibc bounds
checking on the realpath() function.
Users of xen are advised to upgrade to these updated packages, which
resolve these security issues and fix this bug.CVE-2008-1945 qemu/kvm/xen: add image format options for USB storage and removable mediaCVE-2008-1952 qemu/xen/kvm: ioemu: Fix PVFB backend to limit frame buffer sizexen: buffer overflow detected: qcow-create terminatedRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-64.el5_2.3.i386.rpm1ffdf42ae8ddb661c45bc620ad5f673exen-3.0.3-64.el5_2.3.i386.rpme8c33d2c978c69f961b753f84f4ff9c9RHEA-2007:0643libvirt enhancement updateLibvirt is a C toolkit to interact with the virtualization capabilities of
recent versions of Linux and other operating systems.
The Xen hypervisor has been updated to Xen 3.1, which is not ABI compatible
with the earlier Xen 3.0.3 hypervisor. The new libvirt has support for
dealing with the new Xen 3.1 hypervisor ABI format. The libvirt update also
provides improved support for management of inactive virtual machines, and
a NAT based networking model.
All users of libvirt are advised to upgrade to these updated packages,
which contain these enhancements.Add a virsh block-attach/block-detach commandUpdate to libvirt 0.2.3 to support new Xen 3.1.0 hypervisormemory leak: virConnectClose() doesn't free all the memory it shouldNew style PVFB config not processed correctly when starting guests with libvirtDriver for /etc/xen config files does not correctly handle virtual networks"virsh console" should be documented in virsh man pagevirt-install writes vncdisplay=<vncport> in domain configRHEL Virtualization (v. 5 for 32-bit x86)libvirt-devel-0.2.3-9.el5.i386.rpmaf4f983309d3586953e23ab0f9f89382libvirt-0.2.3-9.el5.i386.rpm86c7288f3b9fad826740a4001b5a7069libvirt-python-0.2.3-9.el5.i386.rpmcf136f26cb7c84e15457891685ceddd7RHEA-2008:0467new package: virt-viewerVirtual Machine Viewer (virt-viewer) is a lightweight interface for
interacting with the graphical display of a virtualized guest OS. It uses
GTK-VNC and libvirt to look up the VNC server details associated with the
guest. It is intended as a replacement for the traditional vncviewer
client, since the latter does not support SSL/TLS encryption of x509
certificate authentication.
All users requiring virt-viewer should install this newly-released package,
which adds this enhancement.
New package virt-viewer required for python-virtinst[RHEL5.2]: virt-viewer doesn't capture Alt-s, even when the focus is "grabbed"RHEL Virtualization (v. 5 for 32-bit x86)virt-viewer-0.0.2-2.el5.i386.rpm6470c205d5380a757ca32fa2ef45e28dRHBA-2008:0189libvirt bug fix updateLibvirt is a C toolkit to interact with the virtualization capabilities of
recent versions of Linux, and other operating systems.
These updated packages fix the following bugs:
* the xend_parse_sexp_desc() function used a fixed sized 4k buffer, which
could have been overgrown if the domain description was very complex. For
example, running the "virt-install" command with a large set of network
definitions, may have caused the XML description to exceed the 4k buffer.
When the buffer is re-allocated, libvirt tries to free the old buffer
address, resulting in a segmentation fault. As well, another buffer-growth
problem in libvirt has been resolved.
* a potential crash when applications use libvirt has been resolved.
Users of libvirt are advised to upgrade to these updated packages, which
resolve these issues.libvirt: fix segmentation fault when buffer needs to be reallocatedRHEL Virtualization (v. 5 for 32-bit x86)libvirt-python-0.2.3-9.el5_1.1.i386.rpmcc8f45924aa47f9bf80fce69c4b1f625libvirt-0.2.3-9.el5_1.1.i386.rpma1974239baceb92e2b28efc7bf2c66c2libvirt-devel-0.2.3-9.el5_1.1.i386.rpm746a130f6ee03813c53874c189a2dc26RHBA-2009:0401xen bug fix updateXen is a high performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.
Bugs fixed in these updated packages include:
* Data corruption occurred on guests with virtual SCSI disks larger than
1TB. This update adds support for virtual disks larger than 1TB.
* Various SCSI device data corruption issues occurred on fully virtualized
guests with over 4GB of RAM. This update resolves the data corruption
issues on fully virtualized guests with over 4GB of RAM.
* The Xen SCSI driver scsi_write_data() system call did not verify data if
was written before returning. The SCSI driver now flushes the buffer before
it returns which ensures data is written to the disk.
Users of Xen are advised to upgrade to these updated packages, which
fix these bugs.CRM 1885278 - SCSI problems on fullvirt guests with > 4Gb memLarge file systems corrupting on domU boot.scsi backend: make sure data is actually written to diskRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-80.el5_3.2.i386.rpm8a34e33044673909ab56fd4425847640xen-3.0.3-80.el5_3.2.i386.rpm20b548eef7f8b7ff113807198bd05369RHBA-2008:0433Virtualization_Guide enhancement updateThe Virtualization_Guide package contains the Red Hat Enterprise Linux
Virtualization Guide. The Virtualization Guide documents installation,
system administration, concepts, procedures and reference material for
configuring virtualization on Red Hat Enterprise Linux.
The updated Virtualization_Guide package contains extensive content
updates to support new features and enhancements for the virtualization
packages in Red Hat Enterprise Linux 5.2.
Users of the virtualization packages should upgrade to this updated
package, which provides these enhancements.Need to document setup and use of Xen/virt-manager remote managementI/O error : Attempt to load network entity http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtdRHEL Virtualization (v. 5 for 32-bit x86)Virtualization-it-IT-5.2-9.noarch.rpm16d4d07e06b8982c0fb956ac04d5a7f9Virtualization-fr-FR-5.2-9.noarch.rpmf7da64ba09d76226f542b51729ef2c99Virtualization-gu-IN-5.2-9.noarch.rpm8bc034f68ee79ce593f0c5eebaf6b34aVirtualization-pa-IN-5.2-9.noarch.rpm4c38579e2bec9447856da8155f62fd0bVirtualization-zh-CN-5.2-9.noarch.rpmb08984e04fcf3d4a30f04158f60902edVirtualization-zh-TW-5.2-9.noarch.rpm2896595e86c68656de664a4671cd44e3Virtualization-kn-IN-5.2-9.noarch.rpm377933213fa8f54d76164d989c0a79b8Virtualization-te-IN-5.2-9.noarch.rpme37ef70ca6a5d06ec381639d6706ba2cVirtualization-ko-KR-5.2-9.noarch.rpma3b98bc8014bb7b25ee56d80ea06adecVirtualization-si-LK-5.2-9.noarch.rpmb6ccef33181056cb4a8788da82158001Virtualization-ta-IN-5.2-9.noarch.rpmc034481573a7f51ac156213f6a40167eVirtualization-es-ES-5.2-9.noarch.rpm91b0f20aeeda88ddae4959797003a173Virtualization-ja-JP-5.2-9.noarch.rpmbf3fb4f0e648a19f5676cb10ddbdb341Virtualization-hi-IN-5.2-9.noarch.rpmad927b4eccd91e8bbb65a50bc0a92ec7Virtualization-ru-RU-5.2-9.noarch.rpm95a7e17022088a89006d18f4197e5428Virtualization-pt-BR-5.2-9.noarch.rpmf10c7747a755391c70b531f9a7845688Virtualization-bn-IN-5.2-9.noarch.rpm37a095fc2b54b061acaa09640323341fVirtualization-mr-IN-5.2-9.noarch.rpm4a284843fea57c29d5fa0f5213d7a611Virtualization-en-US-5.2-9.noarch.rpm4fa9bb9aae5745989e336ed20681053bVirtualization-as-IN-5.2-9.noarch.rpmc07f89d73897cabd4aae751f8d698107Virtualization-de-DE-5.2-9.noarch.rpm440a3dfa861d979d5802e5be2745688dVirtualization-or-IN-5.2-9.noarch.rpma6e68e0062521569bad756bdc5f0e652Virtualization-ml-IN-5.2-9.noarch.rpm477918876d27a0e678ee7e6d07ddf396RHBA-2008:0026python-virtinst bug fix updateThe python-virtinst package contains virtinst, a module to help start
installations of Red Hat Enterprise Linux or Fedora inside a virtual
machine. It supports para-virtualized and fully-virtualized guests. As
well, the python-virtinst package contains a script, virt-install, which
uses virtinst in a command line mode.
When querying the top-level directory, the Red Hat Network (RHN) Satellite
kickstart trees do not serve a valid "HTTP 200 OK" response. This broke
the "virt-install" and "virt-manager" tools, which check if the top-level
directory is valid before starting the installation process.
In the previous python-virtinst package, an "Invalid install location"
error occurred when attempting to perform a Red Hat Enterprise Linux 4 or 5
guest installation, which used a kickstart tree on an RHN Satellite Server.
In this updated package, Red Hat Enterprise Linux 4 and 5 guests can be
installed using kickstart trees on RHN Satellite Servers.
All users of python-virtinst are advised to upgrade to this updated
package, which resolves this issue.virt-install cannot install from tree provided by Satellite serverRHEL Virtualization (v. 5 for 32-bit x86)python-virtinst-0.103.0-3.el5_1.1.noarch.rpm121ca9d77860fdde01be1a3a49641e9dRHBA-2009:1421libvirt-cim bug fix updateThe libvirt-cim package is a Common Manageablity Programming Interface
(CMPI) CIM provider that implements the Distributed Management Task Force's
(DMTF's) System Virtualization, Partitioning and Clustering (SVPC)
virtualization model. This package supports most of the features of libvirt
and enables management of multiple platforms with a single provider.
This updated libvirt-cim package fixes the following bug:
* during installation, when the libvirt-cim package was selected in the KVM
group, the xen package was installed as a dependency. This update removes
the dependency on the xen package so that installing libvirt-cim does not
cause the xen package to be installed. This is useful for customers who
wish to use KVM virtualization with libvirt and libvirt-cim. (BZ#517817)
All users of libvirt-cim are advised to upgrade to this updated package,
which resolves this issue.Xen loads instead of KVM to due to unforeseen libvirt-cim dependenciesRHEL Virtualization (v. 5 for 32-bit x86)libvirt-cim-0.5.5-2.1.el5_4.i386.rpm843c6632052f8987a322660687a2e5beRHBA-2010:0010xen bug fix updateXen is a high-performance and secure open source virtualization framework.
Virtualization allows users to run guest operating systems in virtual
machines on top of a host operating system.
These updated xen packages fix the following bug:
* following a guest shutdown, attempting to recreate that guest may have
failed due to timing issues, which caused the xend daemon to think that the
guest name was still in use, even though it was not. Also, the "xm list"
command (correctly) did not show the name of the guest which had shut down.
As a temporary workaround, running the "xm list" command once would rectify
this situation so that the guest with the same name as the one which had
been shut down could be recreated. This update resolves this issue so that
a guest with the same name as a guest which has recently been shut down can
be recreated immediately, without having to run an interim command.
(BZ#547289)
Xen users are advised to upgrade to these updated packages, which resolve
this issue. Note: after installation, the xend service must be restarted
for this update to take effect.xm-create incorrectly states a vm is in use, when it isn'tRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-94.el5_4.3.i386.rpme39be54379e90183913645b4ed22a154xen-3.0.3-94.el5_4.3.i386.rpmf0e2fb068d704b4989bc09de50909d6bRHBA-2009:0142libvirt bug fix and enhancement updatelibvirt is a C API for managing and interacting with the virtualization
capabilities of Linux, and other operating systems. libvirt also provides
tools for remotely managing virtualized systems.
Bugs fixed in these updated packages include:
* XML special characters caused various bugs in libvirt. The virt-install
command failed when escaped XML characters were used in additional
arguments. For example, using '\&\;' as a command line argument caused
virt-install to fail. Using escaped XML characters in xm configuration
files caused libvirt to crash. Both these issues are resolved in the
updated libvirt packages. The updated libvirt packages have better support
and error checking for escaped XML special characters.
* A bug in libvirt's domain hash table caused virt-manager to crash or
segfault when a domain was removed.
* libvirt caused the order of network bridges specified by virt-install to
change order. The updated libvirt packages respect the order of network
bridges specified by other applications.
* The libvirt RPM did not require the nc package. This caused errors when
using libvirt's remote management utilities when the nc package was not
installed. The libvirt RPM now requires the nc package.
* The libvirt-devel RPM did not require the xen-devel package causing
various errors. the libvirt-devel RPM now explicitly requires the xen-devel
package.
* Para-virtualized guests created with virt-install and the '--vncport'
option to specify a port for vnc access caused libvirt to assigned a random
unused port. The updated package uses the port number specified with the
'--vncport' option.
* Several inconsistent or incomplete man pages for libvirt and the virsh
command are updated in these updated packages.
* The libvirt RPM used a non standard RPM spec file. The libvirt packages
now use standard spec files.
Enhancements added in these updated packages include:
* Devices can now be attached or detached for inactive domains. Inactive
domains now have hot plug functionality.
* libvirt now provides statistics for block devices for para-virtualized
and fully virtualized Red Hat Enterprise Linux 4 guests.
* The updated libvirt packages have enhanced support for expanded xvd,
virtualized block devices.
Users are advised to upgrade to these updated libvirt packages, which
resolve these bugs and provide these enhancements.virt-install lacks XML escaping of extra-argsLibvirt lacks xml escaping for xm config parsing[PATCH] PV guest domain has the different port number from installationlibvirt man page and virsh help incosistencies for "domain commands"virt-install swapping order of bridged networksvirDomainBlockStats should produce stats for RHEL 4 FV & PV guests on RHEL 5.[2/3?] hostconflict between domains in libvirt hashlibvirt RPM should require nc[RHEL5.3]: Make libvirt understand new expanded xvd devices in guestslibvirt-devel should require xen-develRHEL Virtualization (v. 5 for 32-bit x86)libvirt-devel-0.3.3-14.el5.i386.rpm5e5dbc375141b198add86d576dca213alibvirt-0.3.3-14.el5.i386.rpma25c220b6612aafe3a41771cda8e476clibvirt-python-0.3.3-14.el5.i386.rpmbd4cc0be084270c16a6ff2b82008e5b3RHBA-2008:0554Virtualization_Guide bug fix updateThis Virtualization_Guide documents relevant information regarding the
deployment, configuration and administration of Virtualization technologies
in Red Hat Enterprise Linux 5.
These packages address the following bug:
* Previous versions of the Virtualization_Guide relied upon using yelp help
system to render the XML content. When yelp renders large documents, such
as the Deployment Guide, it is prone to intermittent crashing and hanging.
This issue has been solved by re-creating the Virtualization_Guide as a
single page HTML with a framed table of contents that is now rendered by
the system's default browser.
Users of the Virtualization_Guide should upgrade to these updated packages,
which resolve this issues. [All Lang] [Virtualization Guide] - XML Parsing Error during quick navigationRHEL Virtualization (v. 5 for 32-bit x86)Virtualization-ta-IN-5.2-11.noarch.rpmdf4b4f8338728617ab2e1a03b2e77249Virtualization-es-ES-5.2-11.noarch.rpma5e347726beb9e5625480d5971474da8Virtualization-ja-JP-5.2-11.noarch.rpm9b8c916bb47a317807a0bcc3eb8c991eVirtualization-ko-KR-5.2-11.noarch.rpm77d0052f282a8aec45dd62dfdfc066b7Virtualization-ru-RU-5.2-11.noarch.rpmbca62b6154519e281885ffa8b1a63863Virtualization-pt-BR-5.2-11.noarch.rpm0d0e7541b2befdba5ed09992e28a668aVirtualization-bn-IN-5.2-11.noarch.rpm4d357971380be3dd7b0470a7b05d0d00Virtualization-si-LK-5.2-11.noarch.rpm896fa1a7d394ebf58f7445a04178b50eVirtualization-or-IN-5.2-11.noarch.rpmf507d7ddb21e80aea378f0bfe16f041cVirtualization-te-IN-5.2-11.noarch.rpm75856ddd8f8b414c8043bb0cf4e504bdVirtualization-gu-IN-5.2-11.noarch.rpm9d98b9b9ab567121a470f7ece04a422aVirtualization-fr-FR-5.2-11.noarch.rpmb46412fa3dfa39481afd2555d15ae53cVirtualization-hi-IN-5.2-11.noarch.rpm4b17107225f183ad682b573c68934087Virtualization-de-DE-5.2-11.noarch.rpm09c48f90b5a2f9f6cafda6d1feea3f1fVirtualization-as-IN-5.2-11.noarch.rpm2ef11398ade0dee074c1f942953b406aVirtualization-it-IT-5.2-11.noarch.rpme5eb9b199142f09583df42578c85a5adVirtualization-mr-IN-5.2-11.noarch.rpm2cfea3dc5f7b28a2b234bf7e519735b1Virtualization-zh-TW-5.2-11.noarch.rpma9d352a7d6e4a6f612ffe20676d672d7Virtualization-pa-IN-5.2-11.noarch.rpmc7a7046cc24e0a10e05ff10b232eb6d0Virtualization-kn-IN-5.2-11.noarch.rpmbff4bf5cca497b98791b8d38a29f9857Virtualization-en-US-5.2-11.noarch.rpm29f1e608d0461ac791d3f83907152449Virtualization-ml-IN-5.2-11.noarch.rpm1bd8d3c6df6b80682dd0b7e3b4769a54Virtualization-zh-CN-5.2-11.noarch.rpm1513f8350cafd5d801692330b76daacfRHBA-2008:0480virt-manager bug fix and enhancement updateThe Virtual Machine Manager application is a desktop user interface for
managing virtual machines.
This updated package fixes the following bugs:
* when the "xm save" command failed, no errors were visually reported to
the user, and errors such as "ERROR (XendCheckpoint:106) Save failed" were
logged to "xend.log".
* in certain situations, when connecting to the para-virtualized
framebuffer, key repeats did not work correctly, resulting in incorrect key
events.
* when attempting to create a fully-virtualized Microsoft Windows domain,
the second stage of the guest installation may have failed.
* when running "virt-manager" from a terminal, closing the graphical
console caused an error similar to the following:
/usr/share/virt-manager/vncViewer/vnc.py:397: GtkWarning:
_gtk_accel_group_attach: assertion `g_slist_find
(accel_group->acceleratables, object) == NULL' failed
self.topwin.add_accel_group(g)
* no confirmation was provided when deleting a guest. A confirmation dialog
box is now provided.
* it was not possible to use virt-manager to specify additional boot
parameters. Now, virt-manager allows kernel boot parameters to be sent to
the para-virtualized guest installer.
* virt-manager now appends entries to "virt-manager.log", instead of
resetting it when virt-manager is restarted.
* virt-manager did not detect invalid partitions, which may have caused
traceback errors. Now, an error occurs when an invalid location is
specified.
* a memory leak, which caused virt-manager to increasingly use memory when
left open, has been resolved.
* using virt-manager to add disks to an existing guest may have resulted in
an un-bootable guest.
* after pausing and resuming a domain, the "pause" option no longer
appeared in the menu.
* when right-clicking on a guest to delete it, administrators had to click
on another guest, before being able to correctly delete the desired guest.
* it was not possible to use virt-manager to add a bridged networking card.
A traceback and errors similar to the following may have occurred:
TAP bridge path 'eth0 (Bridge br0)' is too long
* in certain situations, using the add hardware wizard to add a disk to a
para-virtualized guest caused a traceback, and a "NameError: global name
'disk' is not defined" error.
* when run for the first time, it was not possible to use virt-manager to
create a HVM guest, as it was not possible to proceed past the "Assigning
storage space" screen.
* a recent dbus security errata prevented virt-manager from obtaining
information about host network and disk devices. This may have prevented
network and CD-ROM devices from being displayed and selected.
* connecting an ISO to an empty CD-ROM may have resulted in an un-bootable
guest.
* it was not possible to send "Ctrl+Alt+Delete" to a guest.
* during guest installation using virt-manager, incorrect partition sizes
were displayed.
* when no path to installation media was specified, installation did not
continue, and no errors occurred. An error message is now provided.
As well, this updated package adds the following enhancements:
* the virt-manager GUI now allows administrators to change media and
CD-ROMs attached to guests.
* the MAC address of guest machines can now be configured.
* graphic device parameters, for example, "vncpasswd", can now be changed.
* virt-manager now displays disk permissions and driver information.
* "extra-args" can now be set using virt-manager.
Note: this updated package upgrades virt-manager to version 0.5.3, which
adds support for remotely managing virtual machines.
Users of virt-manager are advised to upgrade to this updated package,
which resolves these issues and adds these enhancements.error of vm save command cannot be fed back to userKeyboard repeat does not work correctly with vnc paravirt frame bufferRFE: confirmation before deleting guestPause option disappears from right click menudelete doesn't desensitize on guest shutdownRebase to virt-manager 0.5.3 with remote management supportnot able to add bridged network card via addhardwareAdding disk to PV guest with addhardware fails with NameErrorvirt-manager can't create, view details when run for the first timeNo network devices for "Shared physical device" optionconnecting a file to an existing cdrom creates unbootable guestCan not send 'Ctrl+Alt+Del' to GuestOSThe installation is stopped without error message if no cd-rom/dvd definedThe installation is stopped without error message, when we skip to input Install Media URL.RHEL Virtualization (v. 5 for 32-bit x86)virt-manager-0.5.3-8.el5.i386.rpm7e3e00ade4a21bc85c84d257094091b6RHBA-2007:0112virt-manager bug fix updateVirtual Machine Manager provides a graphical tool for administering virtual
machines such as Xen. It uses libvirt as the backend management API.
Due to limitations in the virtual mouse drivers, the virtual console window
for Xen guest domains shows two cursors which do not line up. After this
update the mouse pointer will automatically be confined to the virtual
console window upon first mouse click. The local cursor will also be hidden
so that only the virtual guest cursor is visible.
Users are advised to upgrade to this updated virt-manager package, which
resolves this issue.Mouse pointer unusable in the graphical consoleRHEL Virtualization (v. 5 for 32-bit x86)virt-manager-0.2.6-7.0.2.el5.i386.rpm9e3510631dc751f78e3f17711d7c2669RHBA-2009:0216python-virtinst enhancement and bug fix updateThe python-virtinst package contains virtinst, a module to help start
installations of Red Hat Enterprise Linux or Fedora inside a virtual
machine. It supports para-virtualized and fully-virtualized guests. As
well, the python-virtinst package contains a script, virt-install, which
uses virtinst in a command-line mode.
This updated package provides the following enhancements:
* Scientific linux install trees are now recognized.
* A 'best fit' numa memory allocation is provided via the --cpuset=auto
option for virt-install.
* A virt-install option '--wait' that sets a hard time limit on installs.
* Support for fetching xen kernels from SUSE trees.
* Support for installing from rawhide/Fedora 10 trees.
In addition, this updated package provides fixes for the following bugs:
* If an error occurred at the xen level and domain info could not be
fetched, virt-install would fail to run.
* virtinst indirectly required gtk via an unnecessary dependency.
* virt-install would not return a non-zero exit status on error
* No entry in virt-install's OS dictionary for Fedora 9 or Windows 2008
* Windows CD-ROM install media is not kept attached to the guest after the
first stage of the installation.
Users of python-virtinst are advised to upgrade to this updated package,
which fixes these issues and provides these enhancements.Add Windows 2008 variantpython-virtinst indirectly depends on gtk2Scientific Linux not recognized as a valid OSRH 5.2 Xen - Cannot Install SLES 10 as Paravirtualized Guestupdate virtinst to install f10 xen guestsRHEL 5.3: virt-install --hvm ignores --extra-argsExtra '/' added to urls can break kernel fetchingFix fetching FTP urls which don't have .treeinfo available.RHEL Virtualization (v. 5 for 32-bit x86)python-virtinst-0.300.2-12.el5.noarch.rpmf4a39f0978a62e7afb8c7a7000233abcRHBA-2010:0205libvirt bug fix and enhancement updateLibvirt is a C toolkit to interact with the virtualization capabilities of
recent versions of Linux (and other OSes).
This update fixes the following bugs:
* on Xen guests, the netfront and RTL8192 network drivers could run
concurrently, bringing up two network interfaces where only one was
configured. The two interfaces would share the same MAC address and could
cause networking difficulties. Support for a netfront interface model has
been added, meaning only the single netfront interface is configured.
(BZ#483884)
* the storage pool deletion routine did not distinguish between files and
directories when removing data. As a result, inactive storage pools could
not be deleted. With this update, files and directories are removed
appropriately, allowing inactive storage pools to be deleted. (BZ#496579)
* when adding a new physical host PCI device, libvirt would not attempt to
reset the PCI bus if other functions or devices were present on the same
bus. Some PCI devices could not utilized for virtualization as a result.
Attempts to reset the PCI bus will now be made, allowing affected devices
to be used for virtualization. (BZ#500213)
* devices attached to a guest in managed mode were not automatically
re-attached to the host OS when the guest shut down. Manual intervention
was required to use these devices again when the guest is re-started.
Managed mode devices will now be re-attached to the host when the guest
shuts down, allowing them to be automatically used when the guest is
re-started. (BZ#500217)
* the Xen driver was not checking that guest domains with the same UUID
also had the same name. Using the "virsh edit" command to change the name
of a Xen domain would make a new copy of the configuration file with the
new name, but not alter the original configuration file. UUIDs and names
for guest domains are now checked to ensure they match. Attempting to
change the name of a domain using the "virsh edit" command will now return
an error message and not make any change to the system. (BZ#504262)
* valid values for the credit scheduler parameter are in the range 0-65534.
A value of 65535 was being accepted as valid, but would not alter the
scheduler configuration. With this release, only values within the valid
range are accepted. (BZ#504914)
* using the info command to change memory values on a KVM guest showed that
inactive KVM guest memory was not being reported correctly. Memory
reporting for unused domains was corrected in the qemu driver and the info
command now returns the correct value. (BZ#508266)
* running the command "virsh vol-key volname" was sometimes resulting in a
segmentation fault. A change was made to the way pool objects are handled
and the key lookup no longer crashes. (BZ#509293)
* using the pool parameter with the virsh vol-path command would result in
errors. The vol-path command was altered to support the pool parameter and
the errors no longer occur. (BZ#509306)
This update also adds the following enhancements:
* support has been added for assigning Single Root I/O Virtualization
(SR-IOV) devices to QEMU guests. (BZ#481748)
* implementation of the "virsh dump" command for QEMU/KVM guests is
included in this release. (BZ#507551)
* support was added to libvirt for KVM PCI device assignment hotplug.
(BZ#517465)
* libvirt now allows the creation of more than 256 guests, and more than
150 DHCP leases. (BZ#519729 & BZ#524280)
Users are advised to upgrade to these updated packages, which resolve these
issues.
For details concerning every bug fix and every enhancement added to the
libvirt package for this release, see the libvirt chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technica
l_Notes/libvirt.htmlXen 5.3 guests in 5.3 host present two NIC with duplicate MAC addresses, only one configured.libvirt: cannot delete storage poolRHEL5.4 vt-d: libvirt should be able to reset a PCI function even if it causes other unused devices/functions to be resetRHEL5.4 vt-d: libvirt does not automatically re-attach an assigned device in the host after guest shutdownXen driver does not check for duplicated UUID, different name between two guests during define.Command "virsh schedinfo" can not deal with the boundary cap value correctlyRFE: Implement core dump API for QEMU driverInactive KVM guest memory reporting via 'info' is funkyvirsh vol-key volname "Segmentation fault"virsh vol-path and vol-delete commands don't support "name" parameterCommand 'virsh find-storage-pool-sources' : error: Unknown failureCommand 'virsh nodedev-create': error: out of memorycreating node device errornodedev-destroy can hang libvirtdCommand vol-delete causes 'failed to connect to the hypervisor'virsh dumpxml produces invalid XML according to virt-xml-validateApplication using libvirt crashes when having concurrent TLS connections (gnutls problem)virsh man page is inaccurateAdd -no-kvm-pit-reinject in qemu cmdline for RHEL guestslibvirt should allow PCI PM reset on multi-function devicesAdd support to libvirt for KVM PCI device assignment hotplugRFE: [LTC 5.5] libvirt control hugepages [202016]After migration, paused VM is running on destinationLibirt does not allow creation of more than 256 guestslibvirt always places IDE disks before virtio/scsi disksxmldesc with a typo makes libvirtd sefaultenlarge the maximum number of DHCP leases in libvirtBlock assignment of devices below non-ACS switch for KVM in libvirt or kernel"unkown failure" when querying Xen with libvirt-0.6.3 (el5.4) from libvirt-0.3.3 (el5.3)"error: unknown procedure: 122" when querying el53 host from el54bridges created by libvirtd are not started unless the host has an IPbackward migration ability should be requested to qemu-kvm when neededlibvirt crashes in xenUnifiedNodeDeviceResetlibvirt can't connect to kvm hypervisor on a certain machine at rhts with RHEL5.5-Server-20100117.0 tree./distribution/virt/install fails with libvirtError: internal error unable to start guest: char device redirected to /dev/pts/1libvirt doesn't correctly detect machine types supported by kvmRHEL Virtualization (v. 5 for 32-bit x86)libvirt-0.6.3-33.el5.i386.rpm9e7e5e95de1bf75d97950bb6e5f34b89libvirt-devel-0.6.3-33.el5.i386.rpm8dc36c5b0e34a0f0af32a783326ff152libvirt-python-0.6.3-33.el5.i386.rpmcb87f2abcd5013255ce633471ae876faRHBA-2010:0281virt-manager bug fix updateVirtual Machine Manager (virt-manager) is a graphical tool for
administering virtual machines for KVM, Xen, and QEMU. virt-manager can
start, stop, add or remove virtualized devices, connect to a graphical or
serial console, and see resource usage statistics for existing
virtualized guests on local or remote machines. virt-manager uses the
libvirt API.
This updated package addresses the following issues:
* adding new isolated virtual networks could create broken or abnormal
network configurations. The updated package provides better error
handling for network creation. (BZ#508273)
* various errors occurred after adding 19 volumes to the storage pool.
(BZ#508357)
* various virt-manager menus and menu items did not have keyboard
shortcuts. (BZ#509746)
* paused virtualized guests could be sent keys using the 'Send Key'
options which could make paused virtualized guests shut down or restart.
The 'Send Key' menu is now disabled if a virtualized guest is paused.
(BZ#509808)
* setting the "Autoconnect" option resulted in an error and virtualized
guests consoles were not automatically opened. (BZ#509985)
* migration from a remote host to a local host (both hosts connected to
virt-manager) failed. The updated package resolves this issue and
migrations to and from a local host work. (BZ#510702)
* migrations were, in some cases, very slow with virt-manager for systems
with multiple network interface cards of different speeds. The updated
virt-manager has an advanced option which allows users to specify which
IP address and port to use for a live migration. Specifying the fastest
network interface will speed up migrations. (BZ#518487)
* virt-manager did not save changes CPU or memory settings to the
configuration files unless another feature was modified. In the updated
package, changed memory and CPU settings are stored persistently.
(BZ#522096)
* specifying an address and port for a remote server using an unecrypted
TCP connection caused VNC connections to fail. VNC connections work in the
updated package when accessing remote hosts with the TCP connection type.
(BZ#534005)
* virt-manager did not persistently store new devices or changes to device
configuration settings to the configuration files. virt-manager now makes
devices persistent in configuration files when new devices are added.
(BZ#539496)
* a traceback error occurred in virt-manager caused by the retry_login
function. The updated package handles this error. (BZ#436320)
The updated package adds the following enhancements:
* support for creating routed virtual networks with virt-manager.
(BZ#452644)
All Virtual Machine Manager users should install this updated package
which fixes bugs and adds an enhancement.Traceback in in retry_login / virt-managervirt-manager can't create routed guestsAdd new Isolated virtual network on host abnormallyerrors will occur when the volume adding to the storage pool more than 19 timesvirt-manager: several accelerator and mnemonic key issues"Paused" status should disable 'Send Key' optionvirt-manager: Traceback in populate_migrate_menuCan't migrate a vm from remote connection to localhost in some conditionvirt-manager does not save CPU/memory changes unless other changes are madeSpecifying port in addition to the host for tcp connections to remote libvirtd breaks virt-manager's VNC connectivityvirt-manager doesn't save storage device changes in /etc/xen/guestnameRHEL Virtualization (v. 5 for 32-bit x86)virt-manager-0.6.1-12.el5.i386.rpm8342832f043c868b4b6365c1b2d74c90RHBA-2008:0280xen bug fix updateXen is an open source vitalization monitor; allowing for numerous operating
systems to be in use on the same computer simultaneously.
These packages address the following bug:
* Xen can allow a user to pass a PCI device through to another domain. A
bug was present that would not allow the PCI device to be visible in the
selected domain. This error has now been corrected with this update,
allowing for successful PCI device passthrough.
Users of Xen should upgrade to these updated packages, which resolves
this issues. Cannot use PCI pass throughRHEL Virtualization (v. 5 for 32-bit x86)xen-devel-3.0.3-41.el5_1.6.i386.rpmcb807c5dbad920c6cea4a526cf696454xen-3.0.3-41.el5_1.6.i386.rpmd76b4b87733a2af7371aabcc1f6e304d