RHEL 5 : xen (RHSA-2007:0114)

medium Nessus Plugin ID 25321
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Red Hat host is missing one or more security updates.


An updated Xen package to fix one security issue and two bugs is now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The Xen package contains the tools for managing the virtual machine monitor in Red Hat Enterprise Linux virtualization.

A flaw was found affecting the VNC server code in QEMU. On a fullyvirtualized guest VM, where qemu monitor mode is enabled, a user who had access to the VNC server could gain the ability to read arbitrary files as root in the host filesystem. (CVE-2007-0998)

In addition to disabling qemu monitor mode, the following bugs were also fixed :

* Fix IA64 fully virtualized (VTi) shadow page table mode initialization.

* Fix network bonding in balanced-rr mode. Without this update, a network path loss could result in packet loss.

Users of Xen should update to these erratum packages containing backported patches which correct these issues.


Update the affected xen, xen-devel and / or xen-libs packages.

See Also



Plugin Details

Severity: Medium

ID: 25321

File Name: redhat-RHSA-2007-0114.nasl

Version: 1.27

Type: local

Agent: unix

Published: 5/25/2007

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xen, p-cpe:/a:redhat:enterprise_linux:xen-devel, p-cpe:/a:redhat:enterprise_linux:xen-libs, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/14/2007

Vulnerability Publication Date: 3/20/2007

Reference Information

CVE: CVE-2007-0998

BID: 22967

RHSA: 2007:0114

CWE: 264