Xen Denial of Service Vulnerability (CVE-2015-0268)
Release date:
Updated on:
Affected Systems:
XenSource Xen> = 4.5
Description:
Bugtraq id: 72591
CVE (CAN) ID: CVE-2015-0268
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
When the client of a register in the virtual interrupt controller is written into Xen, the invalid value is considered as a serious error, resulting in host crash. By writing invalid values to the GICD. SGIR registry, the client can initiate a Denial-of-Service attack.
<* Source: Xen
*>
Suggestion:
Vendor patch:
XenSource
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage.
Xsa117.patch Xen 4.5.x, xen-unstable
$ Sha256sum xsa117 *. patch
Release xsa117.patch
$
Http://xen.1045712.n5.nabble.com/Xen-Security-Advisory-117-CVE-2015-0268-arm-vgic-v2-GICD-SGIR-is-not-properly-emulated-td5726206.html
Debian system install Xen and create Win2003 Virtual Machine
XenServer VM physical CPU usage policy
An error occurred while starting the system VM on XenServer in the CloudStack compiling environment.
Disable CloudStack from deleting the original XenServer Virtual Machine
Configure Linux VM boot from the optical drive in XenServer
Enable and configure the SNMP service for Citrix XenServer
Resets the local disk LVM of XenServer to the EXT3 format.
Install and configure Xen On Debian
This article permanently updates the link address: