vulnerability
SUSE: CVE-2015-8550: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:S/C:P/I:P/A:C) | Jan 19, 2016 | Feb 3, 2016 | Feb 4, 2022 |
Severity
6
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:C)
Published
Jan 19, 2016
Added
Feb 3, 2016
Modified
Feb 4, 2022
Description
Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
Solution(s)
suse-upgrade-kernel-defaultsuse-upgrade-kernel-docssuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-develsuse-upgrade-kernel-ec2-extrasuse-upgrade-kernel-obs-buildsuse-upgrade-xensuse-upgrade-xen-develsuse-upgrade-xen-doc-htmlsuse-upgrade-xen-doc-pdfsuse-upgrade-xen-kmp-defaultsuse-upgrade-xen-kmp-paesuse-upgrade-xen-kmp-tracesuse-upgrade-xen-libssuse-upgrade-xen-libs-32bitsuse-upgrade-xen-toolssuse-upgrade-xen-tools-domususe-upgrade-xen-tools-xendomains-wait-disk
References
- SUSE-SUSE-SU-2016:0168-1
- SUSE-SUSE-SU-2016:0585-1
- SUSE-SUSE-SU-2016:0658-1
- SUSE-SUSE-SU-2016:0873-1
- SUSE-SUSE-SU-2016:0911
- SUSE-SUSE-SU-2016:0911-1
- SUSE-SUSE-SU-2016:0955-1
- SUSE-SUSE-SU-2016:1102
- SUSE-SUSE-SU-2016:1102-1
- SUSE-SUSE-SU-2016:1154-1
- SUSE-SUSE-SU-2016:1203-1
- SUSE-SUSE-SU-2016:1318-1
- SUSE-SUSE-SU-2016:1745-1
- SUSE-SUSE-SU-2016:1764
- SUSE-SUSE-SU-2016:1764-1
- DEBIAN-DLA-479-1
- DEBIAN-DSA-3434
- DEBIAN-DSA-3471
- DEBIAN-DSA-3519
- BID-79592
- SECTRACK-1034479
- GENTOO-GLSA-201604-03
- NVD-CVE-2015-8550
- UBUNTU-USN-2846-1
- UBUNTU-USN-2847-1
- UBUNTU-USN-2848-1
- UBUNTU-USN-2849-1
- UBUNTU-USN-2850-1
- UBUNTU-USN-2851-1
- UBUNTU-USN-2853-1
- UBUNTU-USN-2854-1
- UBUNTU-USN-2886-2
- UBUNTU-USN-2891-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.