First published: Tue Sep 10 2013(Updated: )
The virSecurityManagerSetProcessLabel function in libvirt 0.10.2.7, 1.0.5.5, and 1.1.1, when the domain has read an uid:gid label, does not properly set group memberships, which allows local users to gain privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libvirt | =0.10.2.7 | |
Red Hat Libvirt | =1.0.5.5 | |
Red Hat Libvirt | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4291 is considered a high-severity vulnerability due to its potential to allow local users to gain elevated privileges.
To mitigate CVE-2013-4291, upgrade to libvirt versions 1.1.2 or later that address this vulnerability.
CVE-2013-4291 affects libvirt versions 0.10.2.7, 1.0.5.5, and 1.1.1.
The root cause of CVE-2013-4291 is improper handling of group memberships in the virSecurityManagerSetProcessLabel function.
CVE-2013-4291 cannot be exploited remotely as it requires local access to the system.