Description
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3284-1 | qemu security update |
Debian DSA |
DSA-3286-1 | xen security update |
EUVD |
EUVD-2015-4131 | QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors. |
Ubuntu USN |
USN-2630-1 | QEMU vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Citrix
Subscribe
Xenserver
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Qemu
Subscribe
Qemu
Subscribe
Suse
Subscribe
Linux Enterprise Desktop
Subscribe
Linux Enterprise Server
Subscribe
Linux Enterprise Software Development Kit
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T06:04:02.899Z
Reserved: 2015-05-27T00:00:00.000Z
Link: CVE-2015-4106
No data.
Status : Deferred
Published: 2015-06-03T20:59:09.573
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-4106
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN