Xen Denial of Service Vulnerability (CVE-2015-4103)
Xen Denial of Service Vulnerability (CVE-2015-4103)
Release date:
Updated on:
Affected Systems:
XenSource Xen 3.3.x-4.5.x
Description:
CVE (CAN) ID: CVE-2015-4103
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
Xen 3.3.x-4.5.x does not properly restrict the write access to the host MSI message data field. This vulnerability can be exploited by the local x86 HVM client administrator to cause DoS (unexpected interruptions and host crashes ).
<* Source: Jan Beulich
*>
Suggestion:
Vendor patch:
XenSource
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://xenbits.xen.org/xsa/advisory-128.html
XenServer VM physical CPU usage policy
An error occurred while starting the system VM on XenServer in the CloudStack compiling environment.
Disable CloudStack from deleting the original XenServer Virtual Machine
Configure Linux VM boot from the optical drive in XenServer
Enable and configure the SNMP service for Citrix XenServer
Resets the local disk LVM of XenServer to the EXT3 format.
Install and configure Xen On Debian
This article permanently updates the link address: