Xen is prone to a privilege-escalation vulnerability.
An attacker can exploit this issue to to gain elevated privileges.
Note: This issue is the result of an incomplete fix for the issue described in BID 56797 (Xen 'XENMEM_exchange' Local Privilege Escalation Vulnerability).
Information
Xen Xen 4.7
Xen Xen 4.6
Xen Xen 4.6.3
Xen Xen 4.5.3
Xen Xen 4.5.0
Xen Xen 4.4.1
Xen Xen 4.4.0
Redhat Enterprise Linux 5
References:
- Xen Homepage (XenSource )
- x86: broken check in memory_exchange() permits PV guest breakout (Xen)