The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2016-04-13 08:59
Updated : 2017-11-03 18:29
NVD link : CVE-2015-8552
Mitre link : CVE-2015-8552
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
xen
- xen
canonical
- ubuntu_linux
novell
- suse_linux_enterprise_real_time_extension
- suse_linux_enterprise_debuginfo
debian
- debian_linux