Количество 9
Количество 9
CVE-2015-2756
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
CVE-2015-2756
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
CVE-2015-2756
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
CVE-2015-2756
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict a ...
GHSA-vw92-7fxg-964r
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
SUSE-SU-2015:0701-1
Security update for xen
SUSE-SU-2015:0747-1
Security update for Xen
SUSE-SU-2015:0746-1
Security update for Xen
SUSE-SU-2015:0745-1
Security update for Xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-2756 QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | CVSS2: 4.9 | 0% Низкий | почти 11 лет назад | |
CVE-2015-2756 QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | CVSS2: 4.3 | 0% Низкий | почти 11 лет назад | |
CVE-2015-2756 QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | CVSS2: 4.9 | 0% Низкий | почти 11 лет назад | |
CVE-2015-2756 QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict a ... | CVSS2: 4.9 | 0% Низкий | почти 11 лет назад | |
GHSA-vw92-7fxg-964r QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2015:0701-1 Security update for xen | почти 11 лет назад | |||
SUSE-SU-2015:0747-1 Security update for Xen | почти 11 лет назад | |||
SUSE-SU-2015:0746-1 Security update for Xen | почти 11 лет назад | |||
SUSE-SU-2015:0745-1 Security update for Xen | почти 11 лет назад |
Уязвимостей на страницу