QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-479-1 xen security update
Debian DSA Debian DSA DSA-3259-1 qemu security update
EUVD EUVD EUVD-2015-2846 QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
Ubuntu USN Ubuntu USN USN-2608-1 QEMU vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T05:24:38.802Z

Reserved: 2015-03-27T00:00:00

Link: CVE-2015-2756

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-04-01T14:59:08.757

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-2756

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-03-31T00:00:00Z

Links: CVE-2015-2756 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses