1
Candidate: CVE-2015-8554
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554
5
http://xenbits.xen.org/xsa/advisory-164.html
7
Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the
8
qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest
9
administrators to gain privileges by leveraging a system with access to a
10
passed-through MSI-X capable physical PCI device and MSI-X table entries,
11
related to a "write path."
16
Discovered-by: Jan Beulich
20
upstream_qemu-kvm: needs-triage
21
precise_qemu-kvm: not-affected (code not present)
24
vivid/stable-phone-overlay_qemu-kvm: DNE
25
vivid/ubuntu-core_qemu-kvm: DNE
30
upstream_qemu: needs-triage
32
trusty_qemu: not-affected (code not present)
33
vivid_qemu: not-affected (code not present)
34
vivid/stable-phone-overlay_qemu: DNE
35
vivid/ubuntu-core_qemu: DNE
36
wily_qemu: not-affected (code not present)
37
devel_qemu: not-affected (code not present)
40
Tags_xen: universe-binary
41
upstream_xen: needs-triage
42
precise_xen: released (4.1.6.1-0ubuntu0.12.04.8)
43
trusty_xen: released (4.4.2-0ubuntu0.14.04.4)
44
vivid_xen: not-affected
45
vivid/stable-phone-overlay_xen: DNE
46
vivid/ubuntu-core_xen: DNE
47
wily_xen: not-affected
48
devel_xen: not-affected