3.6
CVSSv2

CVE-2015-7311

Published: 01/10/2015 Updated: 30/10/2018
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

libxl in Xen 4.1.x up to and including 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.2.5

xen xen 4.3.0

xen xen 4.3.1

xen xen 4.5.0

xen xen 4.5.1

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.1

xen xen 4.2.2

xen xen 4.3.4

xen xen 4.4.0

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.3.2

xen xen 4.3.3

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.2.3

xen xen 4.2.4

xen xen 4.4.1

Vendor Advisories

Debian Bug report logs - #823620 Multiple security issues Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 6 May 2016 18:03:02 UTC Severity: grave Tags: security Fixed in versions xen/480~rc3-1, xen/48 ...
Multiple security issues have been found in the Xen virtualisation solution, which may result in denial of service or information disclosure For the oldstable distribution (wheezy), an update will be provided later For the stable distribution (jessie), these problems have been fixed in version 441-9+deb8u3 For the unstable distribution (sid), ...
libxl in Xen 41x through 46x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image ...