Your submission was sent successfully! Close

CVE-2015-4106

Published: 03 June 2015

QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.

Priority

Medium

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.0.0+dfsg-2ubuntu1.13)
Patches:
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=d1d35cf4ffb6a60a356193397919e83306d0bb74
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=d61bb2482dc0c7426f451f23ba7e2748ae2cc06d
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=c4ff1e68c621928abc680266cad0a451686c403b
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=0e7ef22136955169a0fd03c4e41af95662352733
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=45ebe3916ab16f859ed930e92fbd52d84d5dcdaf
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=0ad3393ad032f76e88b4dbd04d36ad84dff75dd6
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=a88a3f887181605f4487a22bdfb7d87ffafde5d9
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=c25bbf1545a53ac051f9e51d4140e397660c10ae
qemu-kvm
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

xen
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.2])
Patches:
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-1.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-2.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-3.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-4.2-1.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-4.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-5.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-6.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-7.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemut-8.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-1.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-2.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-3.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-1.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-2.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-3.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-4.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-5.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-6.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-7.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-8.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.4-1.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-5.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-6.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-7.patch
Upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-8.patch
Binaries built from this source package are in Universe and so are supported by the community.

Notes

AuthorNote
seth-arnold
xsa131-qemuu-$n.patch     qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa131-qemuu-4.4-1.patch  Xen 4.4.x replacement for xsa131-qemuu-1.patch
xsa131-qemuu-4.3-$n.patch Xen 4.3.x
xsa131-qemut-$n.patch     qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x
xsa131-qemut-4.2-1.patch  Xen 4.2.x replacement for xsa131-qemut-1.patch

References

Bugs