Understanding The Xen XSA-108 Security Issue
Written by Michael Larabel in Linux Security on 2 October 2014 at 09:15 AM EDT. 1 Comment
LINUX SECURITY --
Many Phoronix readers likely heard of Amazon Web Services, Rackspace, and other hosting providers rebooting their clouds in recent days as a result of a Xen security issue. If you're not yet familiar with this XSA-108 security issue, our friends at Xen Orchestra have a nice write-up covering the issue.

The XSA-108 issue could allow anyone with administrator access to a Xen HVM/PVHVM guest to crash the host or read portions of system's host memory -- either from another guest or the hypervisor itself. Like OpenSSL's Heartbleed bug, only a small amount of memory could be read at a time (up to 3KB) but could be read multiple times over.

Xen stakeholders wishing to learn more about the XSA-108 security issue now that it's no longer embargoed, head on over to the Xen Orchestra blog for their good write-up on the matter.

About The Author
Author picture

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter or contacted via MichaelLarabel.com.

Related Linux Security News
Popular News This Week