Unrated severityNVD Advisory· Published Jan 23, 2018· Updated Sep 16, 2024
CVE-2015-1142857
CVE-2015-1142857
Description
On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.
Affected products
65- osv-coords65 versionspkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/drbd&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-rt_trace&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_25&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4
< 1.4-2.32.4.6+ 64 more
- (no CPE)range: < 1.4-2.32.4.6
- (no CPE)range: < 1.4-2.32.4.6
- (no CPE)range: < 8.4.4-0.27.4.2
- (no CPE)range: < 8.4.4-0.27.4.6
- (no CPE)range: < 8.4.4-0.27.4.6
- (no CPE)range: < 2-0.24.4.6
- (no CPE)range: < 2-0.24.4.6
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.61-52.119.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.61-52.119.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 20170530-21.19.1
- (no CPE)range: < 20170530-21.19.1
- (no CPE)range: < 20110923-0.59.3.1
- (no CPE)range: < 20160516git-10.13.1
- (no CPE)range: < 20170530-21.19.1
- (no CPE)range: < 20170530-21.19.1
- (no CPE)range: < 20140807git-5.8.1
- (no CPE)range: < 20170530-21.19.1
- (no CPE)range: < 20110923-0.59.3.1
- (no CPE)range: < 20160516git-10.13.1
- (no CPE)range: < 20170530-21.19.1
- (no CPE)range: < 20170530-21.19.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101.rt130-69.21.1
- (no CPE)range: < 3.0.101.rt130-69.21.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.61-52.119.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.0.101.rt130-69.21.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.61-52.119.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.0.101.rt130-69.21.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.61-52.119.1
- (no CPE)range: < 3.0.101-108.35.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 3.12.74-60.64.82.1
- (no CPE)range: < 1-2.9.1
- (no CPE)range: < 1-2.9.1
- (no CPE)range: < 1-2.9.1
- (no CPE)range: < 1-1.7.1
- (no CPE)range: < 1.6-0.28.5.6
- (no CPE)range: < 1.6-0.28.5.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- seclists.org/oss-sec/2015/q4/425mitremailing-listx_refsource_MLIST
- security-center.intel.com/advisory.aspxmitrex_refsource_CONFIRM
- www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-smolyar.pdfmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.