Xen arch/x86/mm. c mod_l2_entry Privilege Elevation Vulnerability (CVE-2015-7835)
Xen arch/x86/mm. c mod_l2_entry Privilege Elevation Vulnerability (CVE-2015-7835)
Release date:
Updated on:
Affected Systems:
XenSource Xen 3.4-4.6.x
Description:
CVE (CAN) ID: CVE-2015-7835
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
In Xen 3.4-4.6.x, The mod_l2_entry function in arch/x86/mm. c does not correctly verify the layer-2 page table. The local PV client can use the constructed super page ing to obtain the elevation permission.
<* Source: Yan shangcong (haofeng)
Link: http://xenbits.xen.org/xsa/advisory-148.html
*>
Suggestion:
Vendor patch:
XenSource
---------
XenSource has released a Security Bulletin (advisory-148) and corresponding patches for this:
Advisory-148: Xen Security Advisory CVE-2015-7835/XSA-148
Link: http://xenbits.xen.org/xsa/advisory-148.html
An error occurred while starting the system VM on XenServer in the CloudStack compiling environment.
Disable CloudStack from deleting the original XenServer Virtual Machine
Configure Linux VM boot from the optical drive in XenServer
Enable and configure the SNMP service for Citrix XenServer
Resets the local disk LVM of XenServer to the EXT3 format.
Install and configure Xen On Debian
Install Xen4.3.0 from the source code of Fedora 20
This article permanently updates the link address: