RHEL 5 : xen (RHSA-2007:0114)

medium Nessus Plugin ID 25321

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An updated Xen package to fix one security issue and two bugs is now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The Xen package contains the tools for managing the virtual machine monitor in Red Hat Enterprise Linux virtualization.

A flaw was found affecting the VNC server code in QEMU. On a fullyvirtualized guest VM, where qemu monitor mode is enabled, a user who had access to the VNC server could gain the ability to read arbitrary files as root in the host filesystem. (CVE-2007-0998)

In addition to disabling qemu monitor mode, the following bugs were also fixed :

* Fix IA64 fully virtualized (VTi) shadow page table mode initialization.

* Fix network bonding in balanced-rr mode. Without this update, a network path loss could result in packet loss.

Users of Xen should update to these erratum packages containing backported patches which correct these issues.

Solution

Update the affected xen, xen-devel and / or xen-libs packages.

See Also

https://access.redhat.com/security/cve/cve-2007-0998

https://access.redhat.com/errata/RHSA-2007:0114

Plugin Details

Severity: Medium

ID: 25321

File Name: redhat-RHSA-2007-0114.nasl

Version: 1.27

Type: local

Agent: unix

Published: 5/25/2007

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xen, p-cpe:/a:redhat:enterprise_linux:xen-devel, p-cpe:/a:redhat:enterprise_linux:xen-libs, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/14/2007

Vulnerability Publication Date: 3/20/2007

Reference Information

CVE: CVE-2007-0998

BID: 22967

CWE: 264

RHSA: 2007:0114