[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-API] Fwd: Security update for VU#649219


  • To: xen-api <xen-api@xxxxxxxxxxxxxxxxxxx>
  • From: Marco Sinhoreli <msinhore@xxxxxxxxx>
  • Date: Thu, 14 Jun 2012 16:21:37 -0300
  • Delivery-date: Thu, 14 Jun 2012 19:21:45 +0000
  • List-id: User and development list for XCP and XAPI <xen-api.lists.xen.org>

FYI

---------- Forwarded message ----------
From: Marco Sinhoreli <msinhore@xxxxxxxxx>
Date: Thu, Jun 14, 2012 at 4:17 PM
Subject: Re: [Xen-API] Security update for VU#649219
To: George Shuklin <george.shuklin@xxxxxxxxx>
Cc: xen-api@xxxxxxxxxxxxx


It would be nice to have something like XenServer update to be applied in XCP.

Thanks,

On Thu, Jun 14, 2012 at 2:16 PM, George Shuklin
<george.shuklin@xxxxxxxxx> wrote:
> See topic "[XCP] CVE-2012-0217 - PV privilege escalation and XCP 1.1" in
> xen-api@
>
> Right now I'm testing 'snatched' Âhypervisor from xenserver fix.
>
> If I found no issues with it, I'll post link to rpm and instruction with
> howto steps to it creation.
>
>
> On 14.06.2012 20:30, Marco Sinhoreli wrote:
>>
>> Hi guys:
>>
>> Somebody know if has a bugfix for VU#649219 vulnerability?
>>
>> http://www.kb.cert.org/vuls/id/649219
>> http://support.citrix.com/article/CTX133161
>>
>> thanks!
>>
>
> _______________________________________________
> Xen-api mailing list
> Xen-api@xxxxxxxxxxxxx
> http://lists.xen.org/cgi-bin/mailman/listinfo/xen-api



--
Marco Sinhoreli


-- 
Marco Sinhoreli

_______________________________________________
Xen-api mailing list
Xen-api@xxxxxxxxxxxxx
http://lists.xen.org/cgi-bin/mailman/listinfo/xen-api

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.