xen is vulnerable to information disclosure. A security vulnerability was discovered in the QEMU block format auto-detection, when running fully-virtualized guests. Such fully-virtualized guests, with a raw formatted disk image, were able to write a header to that disk image describing another format. This could allow such guests to read arbitrary files in their hypervisor’s host.
CPE | Name | Operator | Version |
---|---|---|---|
xen | eq | 3.0.3__25.0.3.el5 | |
xen | eq | 3.0.3__25.el5 | |
xen | eq | 3.0.3__25.0.4.el5 | |
xen | eq | 3.0.3__25.0.3.el5 | |
xen | eq | 3.0.3__25.el5 | |
xen | eq | 3.0.3__25.0.4.el5 |
lists.gnu.org/archive/html/qemu-devel/2008-04/msg00675.html
secunia.com/advisories/29129
secunia.com/advisories/29963
secunia.com/advisories/30111
secunia.com/advisories/30717
secunia.com/advisories/35062
svn.savannah.gnu.org/viewvc/?view=rev&root=qemu&revision=4277
www.mandriva.com/security/advisories?name=MDVSA-2008:162
www.novell.com/linux/security/advisories/2008_13_sr.html
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2008-0194.html
www.securityfocus.com/bid/29101
www.ubuntu.com/usn/usn-776-1
access.redhat.com/errata/RHSA-2008:0194
exchange.xforce.ibmcloud.com/vulnerabilities/42268
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11021