First published: Wed Aug 28 2013(Updated: )
The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.1.5 | |
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =4.0.1 | |
Xen xen-unstable | =4.0.2 | |
Xen xen-unstable | =4.0.3 | |
Xen xen-unstable | =4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2211 is classified as a medium severity vulnerability due to weak permissions in xenstore keys.
To fix CVE-2013-2211, upgrade to a version of Xen that addresses this vulnerability, typically 4.3.x or later.
CVE-2013-2211 affects Xen versions 4.0.x, 4.1.x, and 4.2.x, specifically the libxenlight (libxl) toolstack library.
Local guest administrators can exploit CVE-2013-2211 to modify the xenstore values due to weak permission settings.
Failure to address CVE-2013-2211 may allow unauthorized modifications to xenstore values, potentially compromising the security of virtualized environments.