First published: Thu Apr 14 2016(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | ||
SUSE Linux Enterprise Real Time Extension | =12-sp1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.5+23-ga4e5191dc0-1 4.19.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8550 is classified as a high severity vulnerability due to its potential to cause a denial of service or privilege escalation.
To fix CVE-2015-8550, update your system to the latest versions of the affected software such as Xen, Linux, and QEMU provided in the remedy list.
CVE-2015-8550 affects systems that provide PV backends, including various versions of Xen and specific distributions of SUSE and Debian.
CVE-2015-8550 requires local guest OS administrative privileges to exploit, thus it cannot be executed remotely.
CVE-2015-8550 is a double fetch vulnerability that allows local guest OS administrators to manipulate memory shared between the frontend and backend, leading to potential system crashes.