Oval Definition:oval:com.ubuntu.precise:def:20158552000
Revision Date:2016-04-13Version:1
Title:CVE-2015-8552 on Ubuntu 12.04 LTS (precise) - medium.
Description:The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks." Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service by flooding the logging system with WARN() messages causing the initial domain to exhaust disk space.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2015-8552
Platform(s):Ubuntu 12.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 12.04 LTS (precise) is installed.
  • AND Package Information
  • The 'linux' package in precise was vulnerable but has been fixed (note: '3.2.0-97.137').
  • OR The 'linux-armadaxp' package in precise was vulnerable but has been fixed (note: '3.2.0-1661.85').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needs-triage now end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needs-triage now end-of-life').
  • OR The 'linux-lts-trusty' package in precise was vulnerable but has been fixed (note: '3.13.0-74.118~precise1').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR The 'linux-ti-omap4' package in precise was vulnerable but has been fixed (note: '3.2.0-1476.99').
  • BACK