Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8551

Опубликовано: 13 апр. 2016
Источник: debian
EPSS Низкий

Описание

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.4~rc6-1~exp1experimentalpackage
linuxfixed4.3.3-3package
linux-2.6removedpackage
linux-2.6no-dsasqueezepackage

Примечания

  • http://xenbits.xen.org/xsa/advisory-157.html

  • https://git.kernel.org/linus/56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d

  • https://git.kernel.org/linus/5e0ce1455c09dd61d029b8ad45d82e1ac0b6c4c9

  • https://git.kernel.org/linus/a396f3a210c3a61e94d6b87ec05a75d0be2a60d0

  • https://git.kernel.org/linus/7cfb905b9638982862f0331b36ccaaca5d383b49

  • https://git.kernel.org/linus/408fb0e5aa7fda0059db282ff58c3b2a4278baa0

EPSS

Процентиль: 22%
0.00073
Низкий

Связанные уязвимости

CVSS3: 6
ubuntu
почти 10 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."

redhat
около 10 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."

CVSS3: 6
nvd
почти 10 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."

CVSS3: 6
github
больше 3 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."

suse-cvrf
около 10 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 22%
0.00073
Низкий