CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
29.7%
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
Vendor | Product | Version | CPE |
---|---|---|---|
xen | xen | 4.1.0 | cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:* |
xen | xen | 4.1.1 | cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:* |
xen | xen | 4.1.2 | cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:* |
xen | xen | 4.1.3 | cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:* |
xen | xen | 4.1.4 | cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:* |
xen | xen | 4.1.5 | cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:* |
xen | xen | 4.1.6.1 | cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:* |
xen | xen | 4.2.0 | cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:* |
xen | xen | 4.2.1 | cpe:2.3:o:xen:xen:4.2.1:-:*:*:*:*:x86:* |
xen | xen | 4.2.2 | cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2015-September/167077.html
lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html
lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html
lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
www.debian.org/security/2015/dsa-3414
www.securityfocus.com/bid/76823
www.securitytracker.com/id/1033633
xenbits.xen.org/xsa/advisory-142.html
bugzilla.redhat.com/show_bug.cgi?id=1257893
security.gentoo.org/glsa/201604-03