MiracleLinux 3 : xen-3.0.3-41.7AXS3 (AXSA:2008-256:01)

high Nessus Plugin ID 283946

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 3 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2008-256:01 advisory.

This package contains the Xen tools and management daemons needed to run virtual machines on x86, x86_64, and ia64 systems.
Information on how to use Xen can be found at the Xen project pages.
The Xen system also requires the Xen hypervisor and domain-0 kernel, which can be found in the kernel-xen* package.
Virtualization can be used to run multiple operating systems on one physical system, for purposes of hardware consolidation, hardware abstraction, or to test untrusted applications in a sandboxed environment.
- rebuild for Asianux 3.0 SP1
- add patch700 to use functions for service script xendomains by default
- modify redhat string to asianux (#2837, Patch701)
- Disable QEMU image format auto-detection CVE-2008-2004
- Fix PVFB to validate frame buffer description
- Fix PVFB to cope with bogus update requests
- Fix QEMU buffer overflow CVE-2007-5730
- Fix QEMU block device extents checking CVE-2008-0928
- Fix FV O_DIRECT flushing
- Fixed xenbaked tmpfile flaw (CVE-2007-3919
- QEmu NE2000 overflow check - CVE-2007-1321
- Pygrub guest escape - CVE-2007-4993
- Rewrite locking in hotplug scripts to fix timeouts
- Require xen-hypervisor-abi = 3.1 to pull in neccessary kernel
- Fixed memory ballooning for HVM restore
- Avoid bogus VNC password prompts after migrate/restore
- Fix UUID normalization when no UUID is present
- Fix handling of 'keymap' param in config files
- Don't destroy guest after shutdown timeout
- Ensure PVFB daemon terminates promptly on domain shutdown
- Fix rtl8139 checksums for VISTA
- Update package description to better reflect reality
- Fix more VNC threading problems
- Fix save/restore edge case
- Fix legacy PVFB for 32-on-64
- Fixed booting guests with legacy native ABI device protocol
- Fix more VNC keycode/keysym mappings issues
- Fix potential QEMU crash when VNC client disconnects
- Add NVRAM support for ia64 guests
- Normalize UUID to avoid loosing guest name upon restarts
- fix ethernet bonding in balanced-rr mode
- Fix vncport type cast for HVM guests
- Ignore failures in dump core
- Rate limit console messages from guest
- Use -r flag to losetup for readonly block devices
- Mark /etc/sysconfig/xend as a config file
- Fix address test in network-bridge
- Permissions of xend-debug.log
- Hotplug scripts error reporting
- Disable network-bridge if running on Dom0 with nfs/iscsi root device
- Fix a race in the pvfb startup
- Loadable pvfb keymap
- Fix pvfb save/restore broken in 3.0.3-27.el5
- Fixed 32-bit core dumps with HVM
- Add persistent logging of guest & hypervisor console
- Fix destroyDevice() args
- Check file exists in blktap hotplug scripts
- Make SXPR server in XenD multi-threaded
- Fixed xm man page about block device modes
- Update low level (non-XenD) userspace to work with 3.1.0 hypervisor
- Patch XenD to use 'domid' instead of 'dom' with libxc
- Patch XenD to use new HVM domain creation process
- Remove unused i18n stuff from Makefile
- Fix pygrub, blktapctrl paths to return to original settings
- Back-port 3.1.0 HVM save/restore changes to XenD
- Move HVM save/restore files from /tmp to /var/lib/xen
- Ensure pvfb backend terminates when frontend vanishes early
- Save vncpasswd in xenstore along with the other pvfb configuration
- Fix allocation of fixed VNC ports for pvfb
- Don't start a xen-vncfb process for HVM
- disable qemu monitor mode, for security reasons
- fix IA64 shadow page table mode

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected xen, xen-devel and / or xen-libs packages.

See Also

https://tsn.miraclelinux.com/en/node/353

Plugin Details

Severity: High

ID: 283946

File Name: miracle_linux_AXSA-2008-256.nasl

Version: 1.1

Type: local

Published: 1/14/2026

Updated: 1/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.5

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2007-5730

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:miracle:linux:3, p-cpe:/a:miracle:linux:xen-libs, p-cpe:/a:miracle:linux:xen-devel, p-cpe:/a:miracle:linux:xen

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/28/2008

Vulnerability Publication Date: 5/1/2007

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-1321, CVE-2007-3919, CVE-2007-4993, CVE-2007-5730, CVE-2008-0928, CVE-2008-2004