XEN Security Update XSA-134/135/136, CVE-2015-4163/3209/4164
| Issue | Summary | Affected versions |
|---|---|---|
| XSA-134/CVE-2015-4163 | Malicious or buggy guest domain kernels can mount a Denial of Service attack which, if successful, can affect the whole system. |
|
| XSA-135/CVE-2015-3209 | A guest which has access to an emulated PCNET network device(e.g. with "model=pcnet" in their VIF configuration) can exploit this vulnerability to take over the qemu process elevating its privilege to that of the qemu process. |
|
| XSA-136/CVE-2015-4164 | Malicious guest administrators can cause a Denial of Service affecting the whole system. |
|
To eliminate the security issue for Static Hypervisors:
For customers willing to upgrade to the latest hypervisor tools (corresponding to OnApp version installed)
Run the OnApp Xen Hypervisor installer
1/onapp/onapp-hv-install/onapp-hv-xen-install.shReboot the hypervisor.
Consider migrating (if required) of running guests into any other host before the reboot.
For customers which are using latest hypervisor tools or do not want to upgrade them:
CentOS 5.x
1# yum update xen xen-libsThis should update to the xen-3.4.4-13.el5.onapp.x86_64 version.
CentOS 6.x
1# yum update xen xen-hypervisorThis should update to the xen-4.2.5-38.9.onapp.el6.x86_64 version.
Reboot the hypervisor.
Consider migrating (if required) of running guests into any other host before the reboot.