vulnerability

Ubuntu: (Multiple Advisories) (CVE-2015-8550): Linux kernel vulnerabilities

Severity
6
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:C)
Published
Feb 3, 2016
Added
Feb 3, 2016
Modified
Apr 14, 2025

Description

Felix Wilhelm discovered a race condition in the Xen paravirtualized
drivers which can cause double fetch vulnerabilities. An attacker in the
paravirtualized guest could exploit this flaw to cause a denial of service
(crash the host) or potentially execute arbitrary code on the host.
(CVE-2015-8550)

Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not
perform consistency checks on the device's state. An attacker could exploit this
flaw to cause a denial of service (NULL dereference) on the host.
(CVE-2015-8551)

Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not
perform consistency checks on the device's state. An attacker could exploit this
flaw to cause a denial of service by flooding the logging system with
WARN() messages causing the initial domain to exhaust disk space.
(CVE-2015-8552)

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-74-genericubuntu-upgrade-linux-image-3-13-0-74-generic-lpaeubuntu-upgrade-linux-image-3-13-0-74-lowlatencyubuntu-upgrade-linux-image-3-13-0-74-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-74-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-74-powerpc-smpubuntu-upgrade-linux-image-3-13-0-74-powerpc64-embubuntu-upgrade-linux-image-3-13-0-74-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-57-genericubuntu-upgrade-linux-image-3-16-0-57-generic-lpaeubuntu-upgrade-linux-image-3-16-0-57-lowlatencyubuntu-upgrade-linux-image-3-16-0-57-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-57-powerpc-smpubuntu-upgrade-linux-image-3-16-0-57-powerpc64-embubuntu-upgrade-linux-image-3-16-0-57-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-42-genericubuntu-upgrade-linux-image-3-19-0-42-generic-lpaeubuntu-upgrade-linux-image-3-19-0-42-lowlatencyubuntu-upgrade-linux-image-3-19-0-42-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-42-powerpc-smpubuntu-upgrade-linux-image-3-19-0-42-powerpc64-embubuntu-upgrade-linux-image-3-19-0-42-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-1476-omap4ubuntu-upgrade-linux-image-3-2-0-97-genericubuntu-upgrade-linux-image-3-2-0-97-generic-paeubuntu-upgrade-linux-image-3-2-0-97-highbankubuntu-upgrade-linux-image-3-2-0-97-omapubuntu-upgrade-linux-image-3-2-0-97-powerpc-smpubuntu-upgrade-linux-image-3-2-0-97-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-97-virtualubuntu-upgrade-linux-image-4-2-0-22-genericubuntu-upgrade-linux-image-4-2-0-22-generic-lpaeubuntu-upgrade-linux-image-4-2-0-22-lowlatencyubuntu-upgrade-linux-image-4-2-0-22-powerpc-e500mcubuntu-upgrade-linux-image-4-2-0-22-powerpc-smpubuntu-upgrade-linux-image-4-2-0-22-powerpc64-embubuntu-upgrade-linux-image-4-2-0-22-powerpc64-smpubuntu-upgrade-qemu-kvmubuntu-upgrade-qemu-systemubuntu-upgrade-qemu-system-aarch64ubuntu-upgrade-qemu-system-armubuntu-upgrade-qemu-system-mipsubuntu-upgrade-qemu-system-miscubuntu-upgrade-qemu-system-ppcubuntu-upgrade-qemu-system-sparcubuntu-upgrade-qemu-system-x86
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.