XSA-108

| | Comments (0)
being as we're all fully paravirtualized guests, we're okay;  no reboot is required.  


see: 

http://xenbits.xen.org/xsa/advisory-108.html

the most relevant bits to prgmr.com follow.  Note, prgmr.com only offers paravirtualized guests, so as far as I understand, this isn't a problem for us. 

IMPACT
======

A buggy or malicious HVM guest can crash the host or read data
relating to other guests or the hypervisor itself.

VULNERABLE SYSTEMS
==================

Xen 4.1 and onward are vulnerable.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

MITIGATION
==========

Running only PV guests will avoid this vulnerability.

Leave a comment

About this Entry

This page contains a single entry by luke published on October 1, 2014 4:39 AM.

cattle and girdle down - or "Why read-only friday exists" was the previous entry in this blog.

Watching the sausage being made: lvm and duplicate PV is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.