Описание
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1:2.2+dfsg-5expubuntu9 |
| esm-infra-legacy/trusty | released | 2.0.0+dfsg-2ubuntu1.11 |
| lucid | DNE | |
| precise | DNE | |
| trusty | released | 2.0.0+dfsg-2ubuntu1.11 |
| trusty/esm | released | 2.0.0+dfsg-2ubuntu1.11 |
| upstream | needs-triage | |
| utopic | released | 2.1+dfsg-4ubuntu6.6 |
| vivid | released | 1:2.2+dfsg-5expubuntu9 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| lucid | ignored | end of life |
| precise | not-affected | code not present |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needs-triage | |
| utopic | DNE | |
| vivid | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.1-0ubuntu0.14.04.5]] |
| lucid | DNE | |
| precise | released | 4.1.6.1-0ubuntu0.12.04.6 |
| trusty | released | 4.4.1-0ubuntu0.14.04.5 |
| trusty/esm | DNE | trusty was released [4.4.1-0ubuntu0.14.04.5] |
| upstream | needs-triage | |
| utopic | released | 4.4.1-0ubuntu0.14.10.5 |
| vivid | not-affected |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| lucid | ignored | end of life |
| precise | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | ignored | end of life |
| utopic | DNE | |
| vivid | DNE |
Показывать по
EPSS
4.9 Medium
CVSS2
Связанные уязвимости
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict a ...
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
EPSS
4.9 Medium
CVSS2