Описание
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.5.1-0ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.3]] |
| precise | not-affected | 4.1.6.1-0ubuntu0.12.04.6 |
| trusty | released | 4.4.2-0ubuntu0.14.04.3 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.3] |
| upstream | needed | |
| vivid | released | 4.5.0-1ubuntu4.3 |
| wily | released | 4.5.1-0ubuntu1.1 |
Показывать по
3.6 Low
CVSS2
Связанные уязвимости
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly ...
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
Уязвимость гипервизора Xen, позволяющая нарушителю записывать данные на диск, предназначенный только для чтения
3.6 Low
CVSS2