Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Xen Fixes "Worst Ever" 7 Year Old Privilege Escalation Bug
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Comments

  • The bug has been introduced a while ago, so to say, when the support

    for superpages has been added

    Typical. Security vs features.

  • emgemg Veteran
    edited October 2015

    Oops. I looked for another thread on the same topic, but missed it. Someone else already started it here, so lets move there:

    http://www.lowendtalk.com/discussion/67097/significant-xen-security-bug

  • The vulnerability affects Xen version 3.4 and later, **but only on x86 systems. **

    How many servers did use 32 bit? So I don't think that this was a real issue in 2015.

  • rm_rm_ IPv6 Advocate, Veteran
    edited October 2015

    Alajos said: How many servers did use 32 bit?

    What you quoted only means ARM is not affected (next sentence right after that one). Also they say

    it doesn't matter if the guests are running 32-bit or 64-bit instances

    and iirc you can't run 64-bit guest instance on a 32-bit host.

Sign In or Register to comment.