Article ID: 114448, created on Jul 26, 2012, last review on Apr 26, 2014

  • Applies to:
  • Virtuozzo hypervisor 5.0
----------------------------------------------------------------------
Synopsis:          New Parallels Server Bare Metal 5.0 kernel provides
                   an update with security and stability fixes.
Product:           Parallels Server Bare Metal 5.0
Keywords:          "bugfix" "stability" "security"

----------------------------------------------------------------------

This document provides information on the new Parallels Server Bare Metal 5.0
kernel, version 2.6.32-042stab059.7.

--------------------------------------------------------------------------------
TABLE OF CONTENTS

1. About This Release
2. Updates Description
3. Obtaining New Kernel
4. Required RPMs
5. References

--------------------------------------------------------------------------------

1. ABOUT THIS RELEASE

The current update for the Parallels Server Bare Metal 5.0 kernel provides a
new kernel based on the Red Hat Enterprise Linux 6.3 kernel
(2.6.32-279.1.1.el6). The updated kernel includes a number of security and
stability fixes.

--------------------------------------------------------------------------------

2. UPDATES DESCRIPTION

This update contains fixes for the following issues:

* Pre-online migration checks have been enhanced. Messages reported if some
  issues are detected preventing online migration have been made more user
  friendly. (PSBM-13676)

* The Open vSwitch kernel module has been added to the Parallels Server Bare
  Metal 5.0 kernel. (PSBM-10295)

* The GRO feature is now enabled by default in the "benet" network card driver.
  With the GRO feature disabled, some network cards supported by the "benet"
  driver could drop TCP/UDP incoming traffic. (PSBM-13817)

* Under certain circumstances, the sys_clock_gettime(CLOCK_MONOTONIC) call could
  return a non-monotonic value in a Container that was migrated online to
  another Hardware Node. (PSBM-13860)

* Under certain circumstances, the Source Node could leak swap entries allocated
  by a Container that was migrated to another Hardware Node using the online
  migration type. (PCLIN-30780)

* Sometimes, renaming a network interface on a Hardware Node could fail.
  (PSBM-14016)

* A kernel panic could occur in the journal_commit_transaction() function.
  (PCLIN-30972)

* A possible deadlock in the memory reclaimer code has been fixed. (PSBM-14021)

* When migrating a Container using the online migration type, a kernel panic
  could occur on the Destination Node if the CPUs on the Source Node had the
  "xsave" feature, while the CPUs on the Destination Node did not have this
  feature and the administrator forced the migration, disregarding the
  respective warning messages. (PCLIN-31031, OVZ 2275)

* The cgroups code has been reworked to fix possible deadlocks and crashes.
  (OVZ 2278)

* A kernel panic could occur when mounting an NFS volume in the case of memory
  shortage. (PCLIN-31080)

--------------------------------------------------------------------------------

3. OBTAINING NEW KERNEL

You can download and install this kernel update using the vzup2date utility
included in the Parallels Server Bare Metal 5.0 distribution set.

--------------------------------------------------------------------------------

5. REQUIRED RPMS

Depending on the processor installed on the Hardware Node, the following RPM
packages are included in the kernel update:

   vzkernel-2.6.32-042stab059.7.x86_64.rpm
   vzkernel-firmware-2.6.32-042stab059.7.noarch.rpm
   vzmodules-2.6.32-042stab059.7.x86_64.rpm
   parallels-kmod-5.0.13271.709218-1.2.6.32_042stab059.7.x86_64.rpm

--------------------------------------------------------------------------------

6. REFERENCES

http://rhn.redhat.com/errata/RHSA-2012-0862.html
https://www.redhat.com/security/data/cve/CVE-2011-1083.html
https://www.redhat.com/security/data/cve/CVE-2011-4131.html

http://rhn.redhat.com/errata/RHSA-2012-1064.html
https://www.redhat.com/security/data/cve/CVE-2012-2744.html
https://www.redhat.com/security/data/cve/CVE-2012-2745.html

--------------------------------------------------------------------------------
Copyright (c) 1999-2012 Parallels Holdings, Ltd. and its affiliates. All rights
reserved.

c662da62f00df94fd77ba7a2c9eff4b4 2897d76d56d2010f4e3a28f864d69223 a26b38f94253cdfbf1028d72cf3a498b

Email subscription for changes to this article
Save as PDF