{"id":"CVE-2015-8552","details":"The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \"Linux pciback missing sanity checks.\"","modified":"2026-04-16T01:43:38.056146665Z","published":"2016-04-13T15:59:06Z","withdrawn":"2026-01-27T04:15:14.287209Z","related":["SUSE-SU-2016:0168-1","SUSE-SU-2016:0911-1","SUSE-SU-2016:1102-1","SUSE-SU-2016:1203-1","SUSE-SU-2016:1707-1","SUSE-SU-2016:1764-1","SUSE-SU-2016:1937-1","SUSE-SU-2016:2105-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3434"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/79546"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034480"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-157.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201604-03"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}