xen-3.0.3-64.3.1AXS3

エラータID: AXSA:2008-443:02

リリース日: 
2008/12/01 Monday - 13:00
題名: 
xen-3.0.3-64.3.1AXS3
影響のあるチャネル: 
Asianux Server 3 for ia64
Severity: 
High
Description: 

This package contains the Xen tools and management daemons needed to run virtual machines.
Information on how to use Xen can be found at the Xen project pages.
The Xen system also requires the Xen hypervisor and domain-0 kernel, which can be found in the kernel-xen* package.
Virtualization can be used to run multiple operating systems on one physical system, for purposes of hardware consolidation, hardware abstraction, or to test untrusted applications in a sandboxed environment.
Bugs fixed:
CVE-2007-4993
pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
CVE-2007-1321
Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.
CVE-2007-3919
(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.
CVE-2008-0928
Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
CVE-2007-5730
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.
CVE-2008-2004
The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted.
CVE-2008-1945
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
CVE-2008-1952
The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen ioemu does not properly restrict the frame buffer size, which allows attackers to cause a denial of service (crash) by mapping an arbitrary amount of guest memory.
- rebuild for Asianux 3.0 SP1
- use functions for service script xendomains by default
- Fix PVFB to validate frame buffer description
- Fix PVFB to cope with bogus update requests
- Fix FV O_DIRECT flushing
- Rewrite locking in hotplug scripts to fix timeouts
- Require xen-hypervisor-abi = 3.1 to pull in neccessary kernel
- Fixed memory ballooning for HVM restore
- Avoid bogus VNC password prompts after migrate/restore
- Fix UUID normalization when no UUID is present
- Fix handling of 'keymap' param in config files
- Don't destroy guest after shutdown timeout
- Ensure PVFB daemon terminates promptly on domain shutdown
- Fix rtl8139 checksums for VISTA
- Update package description to better reflect reality
- Fix more VNC threading problems
- Fix save/restore edge case
- Fix legacy PVFB for 32-on-64
- Fixed booting guests with legacy native ABI device protocol
- Fix more VNC keycode/keysym mappings issues
- Fix potential QEMU crash when VNC client disconnects
- Add NVRAM support for ia64 guests
- Normalize UUID to avoid loosing guest name upon restarts
- fix ethernet bonding in balanced-rr mode
- Fix vncport type cast for HVM guests
- Ignore failures in dump core
- Rate limit console messages from guest
- Use -r flag to losetup for readonly block devices
- Mark /etc/sysconfig/xend as a config file
- Fix address test in network-bridge
- Permissions of xend-debug.log
- Hotplug scripts error reporting
- Disable network-bridge if running on Dom0 with nfs/iscsi root device
- Fix a race in the pvfb startup
- Loadable pvfb keymap
- Fix pvfb save/restore broken in 3.0.3-27.el5
- Fixed 32-bit core dumps with HVM
- Add persistent logging of guest & hypervisor console
- Fix destroyDevice() args
- Check file exists in blktap hotplug scripts
- Make SXPR server in XenD multi-threaded
- Fixed xm man page about block device modes
- Update low level (non-XenD) userspace to work with 3.1.0 hypervisor
- Patch XenD to use 'domid' instead of 'dom' with libxc
- Patch XenD to use new HVM domain creation process
- Remove unused i18n stuff from Makefile
- Fix pygrub, blktapctrl paths to return to original settings
- Back-port 3.1.0 HVM save/restore changes to XenD
- Move HVM save/restore files from /tmp to /var/lib/xen
- Ensure pvfb backend terminates when frontend vanishes early
- Save vncpasswd in xenstore along with the other pvfb configuration
- Fix allocation of fixed VNC ports for pvfb
- Don't start a xen-vncfb process for HVM
- disable qemu monitor mode, for security reasons
- fix IA64 shadow page table mode

解決策: 

Update packages.

追加情報: 

From Asianux Server 3 SP1 updated packages.

ダウンロード: 

Asianux Server 3 for x86
  1. xen-3.0.3-64.3.1AXS3.i386.rpm
    MD5: 3f93fbf5a17139b36bffe20b423e5705
    SHA-256: b4cd2287ad848c833b8054f56ca4186c0c9f1692acacd1a3734ba92616da9236
    Size: 1.79 MB
  2. xen-devel-3.0.3-64.3.1AXS3.i386.rpm
    MD5: 5f01c16291ae82285798e522d09ace3a
    SHA-256: 053b6272cd8ecf6986f52bb34484404bcb2cb353b72c5e30cea59be3e7ef4bd2
    Size: 217.25 kB
  3. xen-libs-3.0.3-64.3.1AXS3.i386.rpm
    MD5: 732deb61430e180e17480a3075e43e34
    SHA-256: 2401a44e1f01144d771bbb7b392e4054fb0225837e100669e2054ff37f3ef2de
    Size: 142.32 kB

Asianux Server 3 for x86_64
  1. xen-3.0.3-64.3.1AXS3.x86_64.rpm
    MD5: 7e2b299e79c3cb5924378a3ea53e545b
    SHA-256: 9be387630b635f23aab56b02a377587d66ecbcfc48e1b3856b883fcf41e4f549
    Size: 1.78 MB
  2. xen-devel-3.0.3-64.3.1AXS3.x86_64.rpm
    MD5: 7566bbd660e4bd9741e76f4f6e061696
    SHA-256: fbac126b90391914d123bbed8f82f831ab829fd31604f6855c8ec6d86053f180
    Size: 220.76 kB
  3. xen-libs-3.0.3-64.3.1AXS3.x86_64.rpm
    MD5: 4e3e70c75a67a056bf9b66bb58ff4f91
    SHA-256: 90c31e84cac4aa5059850b88f0b2e395a1c3ce93dc9f5b9397503779a058934b
    Size: 138.77 kB