Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8552

Опубликовано: 13 апр. 2016
Источник: debian

Описание

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.4~rc6-1~exp1experimentalpackage
linuxfixed4.3.3-3package
linux-2.6removedpackage
linux-2.6no-dsasqueezepackage

Примечания

  • http://xenbits.xen.org/xsa/advisory-157.html

  • https://git.kernel.org/linus/56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d

  • https://git.kernel.org/linus/5e0ce1455c09dd61d029b8ad45d82e1ac0b6c4c9

  • https://git.kernel.org/linus/a396f3a210c3a61e94d6b87ec05a75d0be2a60d0

  • https://git.kernel.org/linus/7cfb905b9638982862f0331b36ccaaca5d383b49

  • https://git.kernel.org/linus/408fb0e5aa7fda0059db282ff58c3b2a4278baa0

Связанные уязвимости

CVSS3: 4.4
ubuntu
почти 10 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

redhat
около 10 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

CVSS3: 4.4
nvd
почти 10 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

CVSS3: 4.4
github
больше 3 лет назад

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

suse-cvrf
около 10 лет назад

Security update for the Linux Kernel