{"id":"CVE-2015-4106","details":"QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.","modified":"2026-01-27T04:15:02.147827Z","published":"2015-06-03T20:59:09Z","withdrawn":"2026-01-27T04:15:02.147827Z","related":["MGASA-2015-0310","MGASA-2016-0098","SUSE-SU-2015:1042-1","SUSE-SU-2015:1045-1","SUSE-SU-2015:1156-1","SUSE-SU-2015:1157-1","SUSE-SU-2015:2324-1","openSUSE-SU-2024:10196-1"],"references":[{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160154.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160171.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html"},{"type":"ADVISORY","url":"http://support.citrix.com/article/CTX201145"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3284"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3286"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/74949"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032467"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2630-1"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-131.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201604-03"},{"type":"ADVISORY","url":"https://support.citrix.com/article/CTX206006"}],"schema_version":"1.7.3"}