Xen is prone to a privilege-escalation vulnerability.
An attacker can exploit this issue to to gain elevated privileges.
Information
Xen Xen 4.7
Xen Xen 4.6
Xen Xen 4.0.4
Xen Xen 4.0.1
Xen Xen 4.6.3
Xen Xen 4.5.3
Xen Xen 4.5.0
Xen Xen 4.4.1
Xen Xen 4.3
Xen Xen 4.2.3
Xen Xen 4.2.2
Xen Xen 4.2.1
Xen Xen 4.2.0
Xen Xen 4.2
Xen Xen 4.1.6.1
Xen Xen 4.1.5
Xen Xen 4.1.4
Xen Xen 4.1.3
Xen Xen 4.1.2
Xen Xen 4.1.1
Xen Xen 4.1.0
Xen Xen 4.1
Xen Xen 4.0.3
Xen Xen 4.0.2
Xen Xen 4.0.0
Xen Xen 4.0
Xen Xen 3.4.4
Xen Xen 3.4.3
Xen Xen 3.4.2
Xen Xen 3.4.1
Xen Xen 3.4.0
Xen Xen 3.3.2
Xen Xen 3.3.1
Xen Xen 3.3.0
Xen Xen 3.3
Xen Xen 3.2.3
Xen Xen 3.2.2
Xen Xen 3.2.1
Xen Xen 3.2.0
Xen Xen 3.2
Xen Xen 3.1.4
Xen Xen 3.1.3
Xen Xen 3.1
Xen Xen 3.0.4
Xen Xen 3.0.3
Xen Xen 3.0.2
Xen Xen 2.0
Exploit
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at:http://.
References:
- Xen Homepage (XenSource )
- Xen Security Advisory 217 - page transfer may allow PV guest to elevate privileg (Seclists.org)