CVE-2015-8551

NameCVE-2015-8551
DescriptionThe PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3434-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)jessie, jessie (lts)3.16.84-1fixed
stretch (security)4.9.320-2fixed
stretch (lts), stretch4.9.320-3fixed
buster (security), buster, buster (lts)4.19.316-1fixed
bullseye5.10.223-1fixed
bullseye (security)5.10.226-1fixed
bookworm6.1.115-1fixed
bookworm (security)6.1.112-1fixed
trixie6.11.7-1fixed
sid6.11.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourceexperimental4.4~rc6-1~exp1
linuxsourcewheezy3.2.73-2+deb7u2DSA-3434-1
linuxsourcejessie3.16.7-ckt20-1+deb8u2DSA-3434-1
linuxsource(unstable)4.3.3-3
linux-2.6source(unstable)(unfixed)

Notes

[squeeze] - linux-2.6 <no-dsa> (Xen not supported in Squeeze LTS)
http://xenbits.xen.org/xsa/advisory-157.html
https://git.kernel.org/linus/56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d
https://git.kernel.org/linus/5e0ce1455c09dd61d029b8ad45d82e1ac0b6c4c9
https://git.kernel.org/linus/a396f3a210c3a61e94d6b87ec05a75d0be2a60d0
https://git.kernel.org/linus/7cfb905b9638982862f0331b36ccaaca5d383b49
https://git.kernel.org/linus/408fb0e5aa7fda0059db282ff58c3b2a4278baa0

Search for package or bug name: Reporting problems