CVE-2015-8552
Severity
4.4MEDIUM
EPSS
0.2%
top 62.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 13
Latest updateMay 17
Description
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 0.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Debian Linux 6.0, Ubuntu Linux 12.04
🔴Vulnerability Details
3GHSA▶
GHSA-5rmx-m9vr-559r: The PCI backend driver in Xen, when running on an x86 system and using Linux 3↗2022-05-17
OSV▶
CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux 3↗2016-04-13
CVEList▶
CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux 3↗2016-04-13