Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-2756

Опубликовано: 01 апр. 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.9

Описание

QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

РелизСтатусПримечание
devel

released

1:2.2+dfsg-5expubuntu9
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.11
lucid

DNE

precise

DNE

trusty

released

2.0.0+dfsg-2ubuntu1.11
trusty/esm

released

2.0.0+dfsg-2ubuntu1.11
upstream

needs-triage

utopic

released

2.1+dfsg-4ubuntu6.6
vivid

released

1:2.2+dfsg-5expubuntu9

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.1-0ubuntu0.14.04.5]]
lucid

DNE

precise

released

4.1.6.1-0ubuntu0.12.04.6
trusty

released

4.4.1-0ubuntu0.14.04.5
trusty/esm

DNE

trusty was released [4.4.1-0ubuntu0.14.04.5]
upstream

needs-triage

utopic

released

4.4.1-0ubuntu0.14.10.5
vivid

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

end of life
utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 31%
0.00119
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

nvd
почти 11 лет назад

QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

debian
почти 11 лет назад

QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict a ...

github
больше 3 лет назад

QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

suse-cvrf
почти 11 лет назад

Security update for xen

EPSS

Процентиль: 31%
0.00119
Низкий

4.9 Medium

CVSS2