Your submission was sent successfully! Close

CVE-2015-4106

Published: 3 June 2015

QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.

Notes

AuthorNote
seth-arnold
xsa131-qemuu-$n.patch     qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa131-qemuu-4.4-1.patch  Xen 4.4.x replacement for xsa131-qemuu-1.patch
xsa131-qemuu-4.3-$n.patch Xen 4.3.x
xsa131-qemut-$n.patch     qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x
xsa131-qemut-4.2-1.patch  Xen 4.2.x replacement for xsa131-qemut-1.patch
Priority

Medium

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
precise Does not exist

trusty
Released (2.0.0+dfsg-2ubuntu1.13)
upstream Needed

utopic
Released (2.1+dfsg-4ubuntu6.7)
vivid
Released (1:2.2+dfsg-5expubuntu9.2)
Patches:
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=d1d35cf4ffb6a60a356193397919e83306d0bb74
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=d61bb2482dc0c7426f451f23ba7e2748ae2cc06d
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=c4ff1e68c621928abc680266cad0a451686c403b
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=0e7ef22136955169a0fd03c4e41af95662352733
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=45ebe3916ab16f859ed930e92fbd52d84d5dcdaf
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=0ad3393ad032f76e88b4dbd04d36ad84dff75dd6
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=a88a3f887181605f4487a22bdfb7d87ffafde5d9
upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=c25bbf1545a53ac051f9e51d4140e397660c10ae


























qemu-kvm
Launchpad, Ubuntu, Debian
precise Not vulnerable
(code not present)
trusty Does not exist

upstream Needs triage

utopic Does not exist

vivid Does not exist

xen
Launchpad, Ubuntu, Debian
precise
Released (4.1.6.1-0ubuntu0.12.04.6)
trusty Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.2])
upstream Needed

utopic Ignored
(reached end-of-life)
vivid Not vulnerable
(code not present)
Patches:








upstream: http://xenbits.xen.org/xsa/xsa131-qemut-1.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-2.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-3.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-4.2-1.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-4.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-5.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-6.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-7.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemut-8.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-1.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-2.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-3.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-1.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-2.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-3.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-4.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-5.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-6.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-7.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.3-8.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.4-1.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-4.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-5.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-6.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-7.patch
upstream: http://xenbits.xen.org/xsa/xsa131-qemuu-8.patch
Binaries built from this source package are in Universe and so are supported by the community.