Описание
The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
precise | DNE | |
trusty | not-affected | code not present |
trusty/esm | not-affected | code not present |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | not-affected | code not present |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | not-affected | code not present |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE | |
yakkety | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.9]] |
esm-infra/xenial | not-affected | |
precise | released | 4.1.6.1-0ubuntu0.12.04.13 |
trusty | released | 4.4.2-0ubuntu0.14.04.9 |
trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.9] |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | not-affected |
Показывать по
EPSS
3.7 Low
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
The (1) ioport_read and (2) ioport_write functions in Xen, when qemu i ...
The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
EPSS
3.7 Low
CVSS2
7.5 High
CVSS3