CVE-2015-2756
01.04.2015, 14:59
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.Enginsight
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
xen | xen | 4.3.0 |
xen | xen | 4.3.1 |
xen | xen | 4.3.2 |
xen | xen | 4.4.0 |
xen | xen | 4.4.1 |
xen | xen | 4.5.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 14.10 |
canonical | ubuntu_linux | 15.04 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||||||||
xen |
|

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||||
qemu-kvm |
| ||||||||||
xen |
| ||||||||||
xen-3.3 |
|
Common Weakness Enumeration
References