Описание
ELSA-2007-0114: Important: xen security update (IMPORTANT)
[3.0.3-25.0.3.el5]
- fix ethernet bonding in balanced-rr mode, respin (rhbz#215887)
[3.0.3-25.0.2.el5]
- fix ethernet bonding in balanced-rr mode (rhbz#215887)
[3.0.3-25.0.1.el5]
- disable qemu monitor mode, for security reasons (rhbz#230295)
- fix IA64 shadow page table mode (rhbz#230459, rhbz#230331)
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
xen
3.0.3-25.0.3.el5
xen-devel
3.0.3-25.0.3.el5
xen-libs
3.0.3-25.0.3.el5
Oracle Linux i386
xen
3.0.3-25.0.3.el5
xen-devel
3.0.3-25.0.3.el5
xen-libs
3.0.3-25.0.3.el5
Связанные CVE
Связанные уязвимости
The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.
The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.
The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.
The VNC server implementation in QEMU, as used by Xen and possibly oth ...
The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.