Xen Denial of Service Vulnerability (CVE-2015-4105)
Xen Denial of Service Vulnerability (CVE-2015-4105)
Release date:
Updated on:
Affected Systems:
XenSource Xen 3.3.x-4.5.x
Description:
CVE (CAN) ID: CVE-2015-4105
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
Xen 3.3.x-4.5.x enables records of PCI MSI-X pass-through error messages, which allows local x86 clients to exploit this vulnerability to cause denial of service (host disk depletion) through some invalid operations ).
<* Source: Jan Beulich
*>
Suggestion:
Vendor patch:
XenSource
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://xenbits.xen.org/xsa/advisory-130.html
XenServer VM physical CPU usage policy
An error occurred while starting the system VM on XenServer in the CloudStack compiling environment.
Disable CloudStack from deleting the original XenServer Virtual Machine
Configure Linux VM boot from the optical drive in XenServer
Enable and configure the SNMP service for Citrix XenServer
Resets the local disk LVM of XenServer to the EXT3 format.
Install and configure Xen On Debian
This article permanently updates the link address: