TROYANOSYVIRUS
Retour aux CVEs

CVE-2015-8552

N/A

Description

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

Details CVE

Score CVSS v3.1N/A
Publie4/13/2016
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0

Produits affectes

canonical:ubuntu_linuxdebian:debian_linuxnovell:suse_linux_enterprise_debuginfonovell:suse_linux_enterprise_real_time_extensionxen:xen

Faiblesses (CWE)

CWE-20

References

http://www.debian.org/security/2016/dsa-3434(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/79546(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1034480(af854a3a-2127-422b-91ae-364da2661108)
http://xenbits.xen.org/xsa/advisory-157.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201604-03(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.