A security issue has been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to bypass certain security restrictions.
The security issue is caused due to the application setting insecure permissions for XenStore keys related to paravirtualised and emulated serial console devices and can be exploited to manipulate values in XenStore and subsequently e.g. read or write files on the host system accessible to the user running the xenconsole client.
The security issue is reported in versions 4.1.x and 4.2.x.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org