Описание
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1:2.3+dfsg-5ubuntu3 |
esm-infra-legacy/trusty | released | 2.0.0+dfsg-2ubuntu1.15 |
precise | DNE | |
trusty | released | 2.0.0+dfsg-2ubuntu1.15 |
trusty/esm | released | 2.0.0+dfsg-2ubuntu1.15 |
upstream | needs-triage | |
utopic | ignored | end of life |
vivid | released | 1:2.2+dfsg-5expubuntu9.3 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | not-affected | pre 1.3.0 |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage | |
utopic | DNE | |
vivid | DNE |
Показывать по
EPSS
6.9 Medium
CVSS2
Связанные уязвимости
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and Q ...
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код на хостовой операционной системе
EPSS
6.9 Medium
CVSS2