QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Debian_linux | Debian | 7.0 (including) | 7.0 (including) |
Debian_linux | Debian | 8.0 (including) | 8.0 (including) |
Qemu | Ubuntu | devel | * |
Qemu | Ubuntu | trusty | * |
Qemu | Ubuntu | utopic | * |
Qemu | Ubuntu | vivid | * |
Qemu-kvm | Ubuntu | lucid | * |
Xen | Ubuntu | precise | * |
Xen | Ubuntu | trusty | * |
Xen | Ubuntu | utopic | * |
Xen-3.3 | Ubuntu | lucid | * |
Xen-3.3 | Ubuntu | upstream | * |