CVE-2015-2150 PUBLISHED

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

EPSS 0.11% · 29.3th percentile

Risk Scores

EPSS Score
0.11%
29.3th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSlinux-azure0, 5.0.0-1036.38, 5.0.0-1035.37
Ubuntu:18.04:LTSlinux-hwe5.0.0-27.28~18.04.1, 0, 4.18.0-13.14~18.04.1
Ubuntu:18.04:LTSlinux-hwe-edge0, 5.0.0-16.17~18.04.1, 5.0.0-15.16~18.04.1
Ubuntu:22.04:LTSlinux-intel-iot-realtime5.15.0-1073.75, 0
Ubuntu:20.04:LTSlinux-gkeop5.4.0-1086.90, 5.4.0-1087.91, 5.4.0-1088.92
Ubuntu:20.04:LTSlinux-gke5.4.0-1101.108, 5.4.0-1102.109, 5.4.0-1103.110
Ubuntu:24.04:LTSlinux-riscv6.8.0-60.63.1, 0, 6.5.0-9.9.1
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1085.90+cvm2.1, 5.4.0-1073.76+cvm1.1, 5.4.0-1074.77+cvm1.1
Ubuntu:24.04:LTSlinux-azure-6.110, 6.11.0-1008.8~24.04.1, 6.11.0-1012.12~24.04.1
Ubuntu:14.04:LTSlinux3.12.0-1.3, 0, 3.13.0-52.86
Ubuntu:24.04:LTSlinux-hwe-6.116.11.0-19.19~24.04.1, 6.11.0-17.17~24.04.2, 0
Ubuntu:24.04:LTSlinux-gcp-6.116.11.0-1013.13~24.04.1, 6.11.0-1011.11~24.04.1, 0
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1088.97~20.04.1.1, 5.15.0-1087.96~20.04.1.1, 5.15.0-1086.95~20.04.1.1
Ubuntu:22.04:LTSlinux-riscv5.15.0-1017.19, 0, 5.13.0-1004.4
Ubuntu:24.04:LTSlinux-realtime0, 6.8.1-1015.16
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:18.04:LTSlinux-gcp4.15.0-1030.32, 4.15.0-1032.34, 4.15.0-1033.35
Ubuntu:20.04:LTSlinux-raspi25.3.0-1017.19, 5.3.0-1014.16, 5.3.0-1015.17
Ubuntu:20.04:LTSlinux-riscv5.4.0-30.34, 5.4.0-28.32, 5.4.0-27.31
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.116.11.0-1009.10~24.04.1, 6.11.0-1012.13~24.04.1, 6.11.0-1013.14~24.04.1

…and 2 more

Timeline

References

Open in Interactive Console →