Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-3525 (GCVE-0-2009-3525)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:31:10.518Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:9466",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
},
{
"name": "[oss-security] 20090925 CVE Request -- Xen -- PyGrub",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"name": "36908",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36908"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"name": "RHSA-2009:1472",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"name": "SUSE-SR:2010:012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"name": "36523",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/36523"
},
{
"name": "1022950",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022950"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-09-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "oval:org.mitre.oval:def:9466",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
},
{
"name": "[oss-security] 20090925 CVE Request -- Xen -- PyGrub",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"name": "36908",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36908"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"name": "RHSA-2009:1472",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"name": "SUSE-SR:2010:012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"name": "36523",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/36523"
},
{
"name": "1022950",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022950"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3525",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:9466",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
},
{
"name": "[oss-security] 20090925 CVE Request -- Xen -- PyGrub",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"name": "36908",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36908"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"name": "RHSA-2009:1472",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"name": "SUSE-SR:2010:012",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"name": "36523",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36523"
},
{
"name": "1022950",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022950"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=525740",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"name": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3",
"refsource": "CONFIRM",
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-3525",
"datePublished": "2009-10-05T19:00:00",
"dateReserved": "2009-10-01T00:00:00",
"dateUpdated": "2024-08-07T06:31:10.518Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-3525\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-10-05T19:30:00.280\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password.\"},{\"lang\":\"es\",\"value\":\"El pyGrub en Xen v3.0.3, v3.3.0, y Xen-3.3.1 no soporta la opci\u00f3n password en grub.conf para las invitaciones \\\"para-virtualized\\\", lo que permite a atacantes con acceso a la consola invitada para-virtualized iniciar la invitaci\u00f3n o modificar los par\u00e1metros de arranque del kernel del invitado sin proporcionar el password esperado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xen:xen:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AFDE72E-1997-48BA-A065-E0DD4ABE6E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xen:xen:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92646AED-BF1E-4471-96A0-1926932AF4C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xen:xen:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5FF923-28A9-406D-B825-8B882408C5E4\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36908\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/09/25/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1472.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/36523\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securitytracker.com/id?1022950\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=525740\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36908\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/09/25/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1472.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/36523\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securitytracker.com/id?1022950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=525740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
gsd-2009-3525
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2009-3525",
"description": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password.",
"id": "GSD-2009-3525",
"references": [
"https://www.suse.com/security/cve/CVE-2009-3525.html",
"https://access.redhat.com/errata/RHSA-2009:1472",
"https://linux.oracle.com/cve/CVE-2009-3525.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-3525"
],
"details": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password.",
"id": "GSD-2009-3525",
"modified": "2023-12-13T01:19:49.453312Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3525",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:9466",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
},
{
"name": "[oss-security] 20090925 CVE Request -- Xen -- PyGrub",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"name": "36908",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36908"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"name": "RHSA-2009:1472",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"name": "SUSE-SR:2010:012",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"name": "36523",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36523"
},
{
"name": "1022950",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022950"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=525740",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"name": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3",
"refsource": "CONFIRM",
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xen:xen:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3525"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=525740",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"name": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3",
"refsource": "CONFIRM",
"tags": [
"Exploit"
],
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
},
{
"name": "[oss-security] 20090925 CVE Request -- Xen -- PyGrub",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"name": "RHSA-2009:1472",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"name": "36523",
"refsource": "BID",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/36523"
},
{
"name": "1022950",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022950"
},
{
"name": "36908",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36908"
},
{
"name": "SUSE-SR:2010:012",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:9466",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-09-19T01:29Z",
"publishedDate": "2009-10-05T19:30Z"
}
}
}
fkie_cve-2009-3525
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html | ||
| cve@mitre.org | http://secunia.com/advisories/36908 | Vendor Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2009/09/25/1 | Patch | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-1472.html | Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/36523 | Exploit | |
| cve@mitre.org | http://www.securitytracker.com/id?1022950 | ||
| cve@mitre.org | http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3 | Exploit | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=525740 | Exploit, Patch | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0 | Exploit, Patch | |
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36908 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2009/09/25/1 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1472.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36523 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022950 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=525740 | Exploit, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0 | Exploit, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xen:xen:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2AFDE72E-1997-48BA-A065-E0DD4ABE6E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xen:xen:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "92646AED-BF1E-4471-96A0-1926932AF4C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xen:xen:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2D5FF923-28A9-406D-B825-8B882408C5E4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password."
},
{
"lang": "es",
"value": "El pyGrub en Xen v3.0.3, v3.3.0, y Xen-3.3.1 no soporta la opci\u00f3n password en grub.conf para las invitaciones \"para-virtualized\", lo que permite a atacantes con acceso a la consola invitada para-virtualized iniciar la invitaci\u00f3n o modificar los par\u00e1metros de arranque del kernel del invitado sin proporcionar el password esperado."
}
],
"id": "CVE-2009-3525",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-10-05T19:30:00.280",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36908"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/36523"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1022950"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36908"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/36523"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022950"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-8xjx-475c-5hjg
Vulnerability from github
The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest's kernel boot parameters without providing the expected password.
{
"affected": [],
"aliases": [
"CVE-2009-3525"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-10-05T19:30:00Z",
"severity": "HIGH"
},
"details": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password.",
"id": "GHSA-8xjx-475c-5hjg",
"modified": "2022-05-02T03:45:58Z",
"published": "2022-05-02T03:45:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3525"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36908"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2009/09/25/1"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1472.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/36523"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1022950"
},
{
"type": "WEB",
"url": "http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2009-AVI-426
Vulnerability from certfr_avis
Une vulnérabilité dans la solution de virtualisation Xen permet à un utilisateur local malintentionné de contourner la politique de sécurité du système.
Description
Une vulnérabilité, causée par un manque de contrôle dans le script pyGrub, peut être exploitée afin de contourner la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Xen 3.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eXen 3.x.\u003c/P\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9, caus\u00e9e par un manque de contr\u00f4le dans le script\npyGrub, peut \u00eatre exploit\u00e9e afin de contourner la politique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3525",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3525"
}
],
"initial_release_date": "2009-10-07T00:00:00",
"last_revision_date": "2009-10-07T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1472 du 01 octobre 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1472.html"
}
],
"reference": "CERTA-2009-AVI-426",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-10-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans la solution de virtualisation Xen permet \u00e0 un\nutilisateur local malintentionn\u00e9 de contourner la politique de s\u00e9curit\u00e9\ndu syst\u00e8me.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2009:1472 du 01 octobre 2009",
"url": null
}
]
}
rhsa-2009:1472
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated xen packages that fix a security issue and multiple bugs are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Xen is an open source virtualization framework. Virtualization allows users\nto run guest operating systems in virtual machines on top of a host\noperating system.\n\nThe pyGrub boot loader did not honor the \"password\" option in the grub.conf\nfile for para-virtualized guests. Users with access to a guest\u0027s console\ncould use this flaw to bypass intended access restrictions and boot the\nguest with arbitrary kernel boot options, allowing them to get root\nprivileges in the guest\u0027s operating system. With this update, pyGrub\ncorrectly honors the \"password\" option in grub.conf for para-virtualized\nguests. (CVE-2009-3525)\n\nThis update also fixes the following bugs:\n\n* rebooting para-virtualized guests sometimes caused those guests to crash\ndue to a race condition in the xend node control daemon. This update fixes\nthis race condition so that rebooting guests no longer potentially causes\nthem to crash and fail to reboot. (BZ#525141)\n\n* due to a race condition in the xend daemon, a guest could disappear from\nthe list of running guests following a reboot, even though the guest\nrebooted successfully and was running. This update fixes this race\ncondition so that guests always reappear in the guest list following a\nreboot. (BZ#525143)\n\n* attempting to use PCI pass-through to para-virtualized guests on certain\nkernels failed with a \"Function not implemented\" error message. As a\nresult, users requiring PCI pass-through on para-virtualized guests were\nnot able to update the xen packages without also updating the kernel and\nthus requiring a reboot. These updated packages enable PCI pass-through for\npara-virtualized guests so that users do not need to upgrade the kernel in\norder to take advantage of PCI pass-through functionality. (BZ#525149)\n\nAll Xen users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the xend service must be restarted for this update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1472",
"url": "https://access.redhat.com/errata/RHSA-2009:1472"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "525141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525141"
},
{
"category": "external",
"summary": "525142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525142"
},
{
"category": "external",
"summary": "525143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525143"
},
{
"category": "external",
"summary": "525149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525149"
},
{
"category": "external",
"summary": "525740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1472.json"
}
],
"title": "Red Hat Security Advisory: xen security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:35:17+00:00",
"generator": {
"date": "2025-11-21T17:35:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1472",
"initial_release_date": "2009-10-01T17:55:00+00:00",
"revision_history": [
{
"date": "2009-10-01T17:55:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-10-01T13:55:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.src",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.src",
"product_id": "xen-0:3.0.3-94.el5_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-3525",
"discovery_date": "2009-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "525740"
}
],
"notes": [
{
"category": "description",
"text": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Xen: PyGrub missing support for password configuration command",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3525"
},
{
"category": "external",
"summary": "RHBZ#525740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3525",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3525"
}
],
"release_date": "2009-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-01T17:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1472"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Xen: PyGrub missing support for password configuration command"
}
]
}
rhsa-2009_1472
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated xen packages that fix a security issue and multiple bugs are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Xen is an open source virtualization framework. Virtualization allows users\nto run guest operating systems in virtual machines on top of a host\noperating system.\n\nThe pyGrub boot loader did not honor the \"password\" option in the grub.conf\nfile for para-virtualized guests. Users with access to a guest\u0027s console\ncould use this flaw to bypass intended access restrictions and boot the\nguest with arbitrary kernel boot options, allowing them to get root\nprivileges in the guest\u0027s operating system. With this update, pyGrub\ncorrectly honors the \"password\" option in grub.conf for para-virtualized\nguests. (CVE-2009-3525)\n\nThis update also fixes the following bugs:\n\n* rebooting para-virtualized guests sometimes caused those guests to crash\ndue to a race condition in the xend node control daemon. This update fixes\nthis race condition so that rebooting guests no longer potentially causes\nthem to crash and fail to reboot. (BZ#525141)\n\n* due to a race condition in the xend daemon, a guest could disappear from\nthe list of running guests following a reboot, even though the guest\nrebooted successfully and was running. This update fixes this race\ncondition so that guests always reappear in the guest list following a\nreboot. (BZ#525143)\n\n* attempting to use PCI pass-through to para-virtualized guests on certain\nkernels failed with a \"Function not implemented\" error message. As a\nresult, users requiring PCI pass-through on para-virtualized guests were\nnot able to update the xen packages without also updating the kernel and\nthus requiring a reboot. These updated packages enable PCI pass-through for\npara-virtualized guests so that users do not need to upgrade the kernel in\norder to take advantage of PCI pass-through functionality. (BZ#525149)\n\nAll Xen users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the xend service must be restarted for this update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1472",
"url": "https://access.redhat.com/errata/RHSA-2009:1472"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "525141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525141"
},
{
"category": "external",
"summary": "525142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525142"
},
{
"category": "external",
"summary": "525143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525143"
},
{
"category": "external",
"summary": "525149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525149"
},
{
"category": "external",
"summary": "525740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1472.json"
}
],
"title": "Red Hat Security Advisory: xen security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T03:02:31+00:00",
"generator": {
"date": "2024-11-22T03:02:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1472",
"initial_release_date": "2009-10-01T17:55:00+00:00",
"revision_history": [
{
"date": "2009-10-01T17:55:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-10-01T13:55:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:02:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.src",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.src",
"product_id": "xen-0:3.0.3-94.el5_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-3525",
"discovery_date": "2009-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "525740"
}
],
"notes": [
{
"category": "description",
"text": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Xen: PyGrub missing support for password configuration command",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3525"
},
{
"category": "external",
"summary": "RHBZ#525740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3525",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3525"
}
],
"release_date": "2009-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-01T17:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1472"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Xen: PyGrub missing support for password configuration command"
}
]
}
RHSA-2009:1472
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated xen packages that fix a security issue and multiple bugs are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Xen is an open source virtualization framework. Virtualization allows users\nto run guest operating systems in virtual machines on top of a host\noperating system.\n\nThe pyGrub boot loader did not honor the \"password\" option in the grub.conf\nfile for para-virtualized guests. Users with access to a guest\u0027s console\ncould use this flaw to bypass intended access restrictions and boot the\nguest with arbitrary kernel boot options, allowing them to get root\nprivileges in the guest\u0027s operating system. With this update, pyGrub\ncorrectly honors the \"password\" option in grub.conf for para-virtualized\nguests. (CVE-2009-3525)\n\nThis update also fixes the following bugs:\n\n* rebooting para-virtualized guests sometimes caused those guests to crash\ndue to a race condition in the xend node control daemon. This update fixes\nthis race condition so that rebooting guests no longer potentially causes\nthem to crash and fail to reboot. (BZ#525141)\n\n* due to a race condition in the xend daemon, a guest could disappear from\nthe list of running guests following a reboot, even though the guest\nrebooted successfully and was running. This update fixes this race\ncondition so that guests always reappear in the guest list following a\nreboot. (BZ#525143)\n\n* attempting to use PCI pass-through to para-virtualized guests on certain\nkernels failed with a \"Function not implemented\" error message. As a\nresult, users requiring PCI pass-through on para-virtualized guests were\nnot able to update the xen packages without also updating the kernel and\nthus requiring a reboot. These updated packages enable PCI pass-through for\npara-virtualized guests so that users do not need to upgrade the kernel in\norder to take advantage of PCI pass-through functionality. (BZ#525149)\n\nAll Xen users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the xend service must be restarted for this update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1472",
"url": "https://access.redhat.com/errata/RHSA-2009:1472"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "525141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525141"
},
{
"category": "external",
"summary": "525142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525142"
},
{
"category": "external",
"summary": "525143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525143"
},
{
"category": "external",
"summary": "525149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525149"
},
{
"category": "external",
"summary": "525740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1472.json"
}
],
"title": "Red Hat Security Advisory: xen security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:35:17+00:00",
"generator": {
"date": "2025-11-21T17:35:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1472",
"initial_release_date": "2009-10-01T17:55:00+00:00",
"revision_history": [
{
"date": "2009-10-01T17:55:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-10-01T13:55:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-devel@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product_id": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen-libs@3.0.3-94.el5_4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-0:3.0.3-94.el5_4.1.src",
"product": {
"name": "xen-0:3.0.3-94.el5_4.1.src",
"product_id": "xen-0:3.0.3-94.el5_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xen@3.0.3-94.el5_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.src"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.i386"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-0:3.0.3-94.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
},
"product_reference": "xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-3525",
"discovery_date": "2009-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "525740"
}
],
"notes": [
{
"category": "description",
"text": "The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest\u0027s kernel boot parameters without providing the expected password.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Xen: PyGrub missing support for password configuration command",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3525"
},
{
"category": "external",
"summary": "RHBZ#525740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3525",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3525"
}
],
"release_date": "2009-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-01T17:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1472"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Client-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-0:3.0.3-94.el5_4.1.src",
"5Client:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Client:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.src",
"5Server-VT:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server-VT:xen-libs-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-0:3.0.3-94.el5_4.1.src",
"5Server:xen-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-debuginfo-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-devel-0:3.0.3-94.el5_4.1.x86_64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.i386",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.ia64",
"5Server:xen-libs-0:3.0.3-94.el5_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Xen: PyGrub missing support for password configuration command"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.