Oval Definition:oval:com.ubuntu.trusty:def:20158552000
Revision Date:2016-04-13Version:1
Title:CVE-2015-8552 on Ubuntu 14.04 LTS (trusty) - medium.
Description:The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks." Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service by flooding the logging system with WARN() messages causing the initial domain to exhaust disk space.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2015-8552
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • The 'linux' package in trusty was vulnerable but has been fixed (note: '3.13.0-74.118').
  • OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected (note: '4.4.0-1002.2').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR The 'linux-lts-utopic' package in trusty was vulnerable but has been fixed (note: '3.16.0-57.77~14.04.1').
  • OR The 'linux-lts-vivid' package in trusty was vulnerable but has been fixed (note: '3.19.0-42.48~14.04.1').
  • OR The 'linux-lts-wily' package in trusty was vulnerable but has been fixed (note: '4.2.0-22.27~14.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected (note: '4.4.0-13.29~14.04.1').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • BACK