First published: Wed Oct 01 2008(Updated: )
The xen packages contain tools for managing the virtual machine monitor in<br>Red Hat Virtualization.<br>It was discovered that the hypervisor's para-virtualized framebuffer (PVFB)<br>backend failed to validate the frontend's framebuffer description properly.<br>This could allow a privileged user in the unprivileged domain (DomU) to<br>cause a denial of service, or, possibly, elevate privileges to the<br>privileged domain (Dom0). (CVE-2008-1952)<br>A flaw was found in the QEMU block format auto-detection, when running<br>fully-virtualized guests and using Qemu images written on removable media<br>(USB storage, 3.5" disks). Privileged users of such fully-virtualized<br>guests (DomU), with a raw-formatted disk image, were able to write a header<br>to that disk image describing another format. This could allow such guests<br>to read arbitrary files in their hypervisor's host (Dom0). (CVE-2008-1945)<br>Additionally, the following bug is addressed in this update:<br><li> The qcow-create command terminated when invoked due to glibc bounds</li> checking on the realpath() function.<br>Users of xen are advised to upgrade to these updated packages, which<br>resolve these security issues and fix this bug.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xen | <3.0.3-64.el5_2.3 | 3.0.3-64.el5_2.3 |
redhat/xen | <3.0.3-64.el5_2.3 | 3.0.3-64.el5_2.3 |
redhat/xen-devel | <3.0.3-64.el5_2.3 | 3.0.3-64.el5_2.3 |
redhat/xen-devel | <3.0.3-64.el5_2.3 | 3.0.3-64.el5_2.3 |
redhat/xen-libs | <3.0.3-64.el5_2.3 | 3.0.3-64.el5_2.3 |
redhat/xen-libs | <3.0.3-64.el5_2.3 | 3.0.3-64.el5_2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:0892 is considered important due to security implications that may affect system stability and data integrity.
To fix RHSA-2008:0892, upgrade the xen, xen-devel, and xen-libs packages to version 3.0.3-64.el5_2.3 or later.
The affected packages in RHSA-2008:0892 include xen, xen-devel, and xen-libs for the el5_2 version.
RHSA-2008:0892 addresses a vulnerability related to improper validation in the hypervisor's para-virtualized framebuffer backend.
RHSA-2008:0892 is specifically relevant for systems using Red Hat Virtualization with the affected xen packages.