Vulnerability Database

289,697

Total vulnerabilities in the database

CVE-2015-8552

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

  • Published: Apr 13, 2016
  • Updated: Apr 13, 2023
  • CVE: CVE-2015-8552
  • Severity: Low
  • Exploit:

CVSS v3:

  • Severity: Low
  • Score: 4.4
  • AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVSS v2:

  • Severity: Low
  • Score: 1.7
  • AV:L/AC:L/Au:S/C:N/I:N/A:P

CWEs:

Software From Fixed in
xen / xen 3.2.0 3.2.0.x
xen / xen 4.3.2 4.3.2.x
xen / xen 4.1.5 4.1.5.x
xen / xen 3.2.1 3.2.1.x
xen / xen 4.2.2 4.2.2.x
xen / xen 4.2.3 4.2.3.x
xen / xen 4.3.3 4.3.3.x
xen / xen 3.4.0 3.4.0.x
xen / xen 4.3.0 4.3.0.x
xen / xen 4.0.4 4.0.4.x
xen / xen 4.0.2 4.0.2.x
xen / xen 3.3.2 3.3.2.x
xen / xen 4.1.2 4.1.2.x
xen / xen 3.2.2 3.2.2.x
xen / xen 3.4.4 3.4.4.x
xen / xen 4.0.0 4.0.0.x
xen / xen 4.1.1 4.1.1.x
xen / xen 4.2.0 4.2.0.x
xen / xen 4.1.0 4.1.0.x
xen / xen 3.4.3 3.4.3.x
xen / xen 4.1.6 4.1.6.x
xen / xen 4.2.5 4.2.5.x
xen / xen 4.1.3 4.1.3.x
xen / xen 3.2.3 3.2.3.x
xen / xen 4.1.6.1 4.1.6.1.x
xen / xen 4.3.4 4.3.4.x
xen / xen 3.3.1 3.3.1.x
xen / xen 4.2.4 4.2.4.x
xen / xen 3.4.2 3.4.2.x
xen / xen 4.1.4 4.1.4.x
xen / xen 3.4.1 3.4.1.x
xen / xen 3.1.4 3.1.4.x
xen / xen 4.3.1 4.3.1.x
xen / xen 3.3.0 3.3.0.x
xen / xen 4.2.1 4.2.1.x
xen / xen 3.1.3 3.1.3.x
xen / xen 4.0.1 4.0.1.x
xen / xen 4.0.3 4.0.3.x
canonical / ubuntu_linux 12.04 12.04.x
debian / debian_linux 6.0 6.0.x
novell / suse_linux_enterprise_debuginfo 11-sp4 11-sp4.x
novell / suse_linux_enterprise_real_time_extension 11-sp4 11-sp4.x
novell / suse_linux_enterprise_real_time_extension 12-sp1 12-sp1.x