Menu
Xen's latest hypervisor updates are missing some security patches

Xen's latest hypervisor updates are missing some security patches

Versions 4.6.1 and 4.4.4 of the Xen hypervisor don't include the complete fixes for two known vulnerabilities

The Xen Project released new versions of its virtual machine hypervisor, but forgot to fully include two security patches that had been previously made available.

The Xen hypervisor is widely used by cloud computing providers and virtual private server hosting companies.

Xen 4.6.1, released Monday, is flagged as a maintenance release, the kind that are put out roughly every four months and are supposed to include all bug and security patches released in the meantime.

"Due to two oversights the fixes for both XSA-155 and XSA-162 have only been partially applied to this release," the Xen Project noted in a blog post. The same is true for Xen 4.4.4, the maintenance release for the 4.4 branch that was released on Jan. 28, the Project said.

Security conscious users are likely to apply Xen patches to existing installations as they are made available, and not wait for maintenance releases. However, new Xen deployments would likely be based on the latest available versions, which right now contain incomplete fixes for two publicly known and documented security vulnerabilities.

XSA-162 and XSA-155 refer to two vulnerabilities for which patches were released in November and December respectively.

XSA-162, also tracked as CVE-2015-7504, is a vulnerability in QEMU, an open-source virtualization software program that is used by Xen. Specifically, the flaw is a buffer overflow condition in QEMU's virtualization of AMD PCnet network devices. If exploited, it could allow a user of a guest operating system that has access to a virtualized PCnet adapter to elevate his privileges to that of the QEMU process.

XSA-155, or CVE-2015-8550, is a vulnerability in Xen's paravirtualized drivers. Guest OS administrators could exploit the flaw to crash the host or to arbitrary execute code with higher privileges.

"In summary, a simple switch statement operating on shared memory is compiled into a vulnerable double fetch that allows potentially arbitrary code execution on the Xen management domain," said Felix Wilhelm, the researcher who found the flaw, in a blog post back in December.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments