Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen libxl Logging Lets Local Users on a Guest System Cause Denial of Service Conditions on the Guest System
SecurityTracker Alert ID:  1035945
SecurityTracker URL:
CVE Reference:   CVE-2014-3672   (Links to External Site)
Date:  May 23 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Xen. A local user on the guest system can cause denial of service conditions on the guest system.

The libxl toolstack pipes the output of stderr to a file in the '/var/log/xen' directory when QEMU is launched. A local user on an HVM guest system can exploit this to cause the file to consume all available disk space on the guest system.

x86 systems are affected.

ARM systems are not affected.

Andrew Sorensen of reported this vulnerability.

Impact:   A local user on the guest system can consume excessive disk space and cause denial of service conditions on the guest system.
Solution:   The vendor has issued a fix (xsa180-qemut.patch, xsa180-qemuu.patch).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC