The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2016-04-13 15:59
Updated : 2024-02-04 18:53
NVD link : CVE-2015-8552
Mitre link : CVE-2015-8552
CVE.ORG link : CVE-2015-8552
JSON object : View
Products Affected
debian
- debian_linux
novell
- suse_linux_enterprise_debuginfo
- suse_linux_enterprise_real_time_extension
canonical
- ubuntu_linux
xen
- xen
CWE
CWE-20
Improper Input Validation