vulnerability
Ubuntu: (Multiple Advisories) (CVE-2015-8550): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:S/C:P/I:P/A:C) | Feb 3, 2016 | Feb 3, 2016 | Apr 14, 2025 |
Description
Felix Wilhelm discovered a race condition in the Xen paravirtualized
drivers which can cause double fetch vulnerabilities. An attacker in the
paravirtualized guest could exploit this flaw to cause a denial of service
(crash the host) or potentially execute arbitrary code on the host.
(CVE-2015-8550)
Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not
perform consistency checks on the device's state. An attacker could exploit this
flaw to cause a denial of service (NULL dereference) on the host.
(CVE-2015-8551)
Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not
perform consistency checks on the device's state. An attacker could exploit this
flaw to cause a denial of service by flooding the logging system with
WARN() messages causing the initial domain to exhaust disk space.
(CVE-2015-8552)
Solution(s)
References
- CVE-2015-8550
- https://attackerkb.com/topics/CVE-2015-8550
- DEBIAN-DLA-479-1
- DEBIAN-DSA-3434
- DEBIAN-DSA-3471
- DEBIAN-DSA-3519
- NVD-CVE-2015-8550
- UBUNTU-USN-2846-1
- UBUNTU-USN-2847-1
- UBUNTU-USN-2848-1
- UBUNTU-USN-2849-1
- UBUNTU-USN-2850-1
- UBUNTU-USN-2851-1
- UBUNTU-USN-2853-1
- UBUNTU-USN-2854-1
- UBUNTU-USN-2886-2
- UBUNTU-USN-2891-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.