Reuse Denial of Service Vulnerability (CVE-2015-0361) after Xen release)
Release date:
Updated on:
Affected Systems:
XenSource Xen 4.4.x
XenSource Xen 4.3.x
XenSource Xen 4.2.x
Description:
Bugtraq id: 71882
CVE (CAN) ID: CVE-2015-0361
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
On x86 systems, Xen 4.2 has implemented a security vulnerability. Local Users can exploit this vulnerability to cause DoS attacks on the host system. This vulnerability is due to the release and reuse of hvm_domain_relinquish_resources.
<* Source: Mihai Dontu
Link: http://xenbits.xen.org/xsa/advisory-116.html
*>
Suggestion:
Vendor patch:
XenSource
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://xenbits.xen.org/xsa/xsa116.patch
Http://xenbits.xen.org/xsa/xsa116-4.3-4.2.patch
Debian system install Xen and create Win2003 Virtual Machine
XenServer VM physical CPU usage policy
An error occurred while starting the system VM on XenServer in the CloudStack compiling environment.
Disable CloudStack from deleting the original XenServer Virtual Machine
Configure Linux VM boot from the optical drive in XenServer
Enable and configure the SNMP service for Citrix XenServer
Resets the local disk LVM of XenServer to the EXT3 format.
Install and configure Xen On Debian
This article permanently updates the link address: