Release date:
Updated on:
Affected Systems:
XenSource Xen 4.1.x
XenSource Xen 3.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 63931
CVE (CAN) ID: CVE-2013-4554
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
Xen has a local permission Escalation Vulnerability in the implementation of the hvm_do_hypercall () function. Local attackers who can access the client operating system can exploit this vulnerability to gain elevated permissions.
<* Source: Jan Beulich
Link: https://bugzilla.redhat.com/show_bug.cgi? Id = 1029111
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
XenSource
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://lists.xen.org/archives/html/xen-announce
Recommended reading:
How does XenServer add local storage?
Enable and configure the SNMP service for Citrix XenServer
Install XS-Tools (XenServer) in CentOS/Linux)
XenServer Tutorial: How to Implement hot migration