First published: Wed Jun 03 2015(Updated: )
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.3.1 | |
Debian | =7.0 | |
Debian | =8.0 | |
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
XenServer | =6.0 | |
XenServer | =6.0.2 | |
XenServer | =6.1.0 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Ubuntu Linux | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4106 is considered a medium vulnerability that can allow local x86 HVM guests to gain privileges or cause denial of service to the host.
To fix CVE-2015-4106, upgrade to a patched version of QEMU that is above version 2.3.1 or apply available security patches from your operating system vendor.
CVE-2015-4106 affects multiple software distributions including specific versions of QEMU, XenServer, Fedora, Debian, Ubuntu, and SUSE Linux.
The potential impacts of CVE-2015-4106 include privilege escalation, denial of service, and exposure of sensitive information within the affected systems.
There are no official workarounds for CVE-2015-4106; the recommended action is to apply updates or patches as soon as they are available.