MEDIUM · 4.4

CVE-2015-8552

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN message...

Vulnerability Description

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

CVSS Score

4.4

MEDIUM

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
XenXen3.1.3
CanonicalUbuntu Linux12.04
DebianDebian Linux6.0
NovellSuse Linux Enterprise Debuginfo11
NovellSuse Linux Enterprise Real Time Extension11

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-8552?

CVE-2015-8552 is a vulnerability with a CVSS score of 4.4 (MEDIUM). The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN message...

How severe is CVE-2015-8552?

CVE-2015-8552 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-8552?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Canonical Ubuntu Linux, Debian Debian Linux, Novell Suse Linux Enterprise Debuginfo, Novell Suse Linux Enterprise Real Time Extension.