Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-9637

Опубликовано: 17 фев. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.7
CVSS3: 7.5

Описание

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

РелизСтатусПримечание
devel

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/xenial

not-affected

code not present
precise

DNE

trusty

not-affected

code not present
trusty/esm

not-affected

code not present
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

not-affected

code not present

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

DNE

yakkety

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.9]]
esm-infra/xenial

not-affected

precise

released

4.1.6.1-0ubuntu0.12.04.13
trusty

released

4.4.2-0ubuntu0.14.04.9
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.9]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

not-affected

Показывать по

EPSS

Процентиль: 26%
0.00087
Низкий

3.7 Low

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.6
redhat
почти 9 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

CVSS3: 7.5
nvd
больше 8 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

CVSS3: 7.5
debian
больше 8 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu i ...

CVSS3: 7.5
github
больше 3 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

oracle-oval
больше 8 лет назад

ELSA-2016-2963: xen security update (IMPORTANT)

EPSS

Процентиль: 26%
0.00087
Низкий

3.7 Low

CVSS2

7.5 High

CVSS3