Vulnerability Details CVE-2015-8552
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.6%
CVSS Severity
CVSS v3 Score 4.4
CVSS v2 Score 1.7
Products affected by CVE-2015-8552
-
cpe:2.3:o:canonical:ubuntu_linux:12.04
-
cpe:2.3:o:debian:debian_linux:6.0
-
cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11
-
cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11
-
cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:o:xen:xen:4.1.6.1
-
-
-
-
-
-
-
-
-
-
-