The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:20:43.208Z
Reserved: 2015-12-14T00:00:00
Link: CVE-2015-8552

No data.

Status : Modified
Published: 2016-04-13T15:59:06.257
Modified: 2024-11-21T02:38:42.987
Link: CVE-2015-8552
