First published: Wed Apr 01 2015(Updated: )
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
Debian | =8.0 | |
Xen XAPI | =4.3.0 | |
Xen XAPI | =4.3.1 | |
Xen XAPI | =4.3.2 | |
Xen XAPI | =4.4.0 | |
Xen XAPI | =4.4.1 | |
Xen XAPI | =4.5.0 | |
Fedora | =20 | |
Fedora | =21 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2756 has a moderate severity as it can lead to denial of service and potential host crashes.
To fix CVE-2015-2756, update to the latest version of QEMU or apply the security patch provided by your Linux distribution.
CVE-2015-2756 affects QEMU versions used in Debian, Fedora, and Ubuntu among others.
CVE-2015-2756 cannot be exploited remotely as it requires local access to the HVM guest.
If you cannot apply the patch for CVE-2015-2756, consider restricting guest user access or disabling the use of PCI Express devices.