QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
2015-04-01T14:59:08.757
2025-04-12T10:46:40.837
Deferred
CVSSv2: 4.9 (MEDIUM)
AV:L/AC:L/Au:N/C:N/I:N/A:C
3.9
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | debian | debian_linux | 7.0 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | xen | xen | 4.3.0 | Yes |
Operating System | xen | xen | 4.3.1 | Yes |
Operating System | xen | xen | 4.3.2 | Yes |
Operating System | xen | xen | 4.4.0 | Yes |
Operating System | xen | xen | 4.4.1 | Yes |
Operating System | xen | xen | 4.5.0 | Yes |
Operating System | fedoraproject | fedora | 20 | Yes |
Operating System | fedoraproject | fedora | 21 | Yes |
Operating System | canonical | ubuntu_linux | 12.04 | Yes |
Operating System | canonical | ubuntu_linux | 14.04 | Yes |
Operating System | canonical | ubuntu_linux | 14.10 | Yes |
Operating System | canonical | ubuntu_linux | 15.04 | Yes |