Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8554

Опубликовано: 14 апр. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.6
CVSS3: 7.5

Описание

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

РелизСтатусПримечание
devel

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
precise

DNE

trusty

not-affected

code not present
trusty/esm

not-affected

code not present
upstream

needs-triage

vivid

not-affected

code not present
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

not-affected

code not present

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.4]]
precise

released

4.1.6.1-0ubuntu0.12.04.8
trusty

released

4.4.2-0ubuntu0.14.04.4
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.4]
upstream

needs-triage

vivid

not-affected

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

not-affected

Показывать по

EPSS

Процентиль: 19%
0.00061
Низкий

6.6 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

CVSS3: 7.5
nvd
почти 10 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

CVSS3: 7.5
debian
почти 10 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using th ...

CVSS3: 7.5
github
больше 3 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

suse-cvrf
около 10 лет назад

Security update for xen

EPSS

Процентиль: 19%
0.00061
Низкий

6.6 Medium

CVSS2

7.5 High

CVSS3