CVE-2015-4106
Publication date 3 June 2015
Last updated 24 July 2024
Ubuntu priority
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
Status
Package | Ubuntu Release | Status |
---|---|---|
qemu | ||
14.04 LTS trusty |
Fixed 2.0.0+dfsg-2ubuntu1.13
|
|
qemu-kvm | ||
14.04 LTS trusty | Not in release | |
xen | ||
14.04 LTS trusty |
Fixed 4.4.2-0ubuntu0.14.04.2
|
|
Notes
seth-arnold
xsa131-qemuu-$n.patch qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x xsa131-qemuu-4.4-1.patch Xen 4.4.x replacement for xsa131-qemuu-1.patch xsa131-qemuu-4.3-$n.patch Xen 4.3.x xsa131-qemut-$n.patch qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x xsa131-qemut-4.2-1.patch Xen 4.2.x replacement for xsa131-qemut-1.patch
Patch details
References
Related Ubuntu Security Notices (USN)
- USN-2630-1
- QEMU vulnerabilities
- 10 June 2015