4.9

CVE-2015-2150

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

Data is provided by the National Vulnerability Database (NVD)
UbuntuUbuntu Version12.04 Editionlts
XenXen Version3.3.0
XenXen Version3.3.1
XenXen Version3.3.2
XenXen Version3.4.0
XenXen Version3.4.1
XenXen Version3.4.2
XenXen Version3.4.3
XenXen Version3.4.4
XenXen Version4.0.0
XenXen Version4.0.1
XenXen Version4.0.2
XenXen Version4.0.3
XenXen Version4.0.4
XenXen Version4.1.0
XenXen Version4.1.1
XenXen Version4.1.2
XenXen Version4.1.3
XenXen Version4.1.4
XenXen Version4.1.5
XenXen Version4.1.6.1
XenXen Version4.2.0
XenXen Version4.2.1
XenXen Version4.2.2
XenXen Version4.2.3
XenXen Version4.3.0
XenXen Version4.3.1
XenXen Version4.4.0
XenXen Version4.4.0 Updaterc1
XenXen Version4.4.1 Update-
XenXen Version4.5.0
LinuxLinux Kernel Version <= 3.19.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.11% 0.299
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C