First published: Wed Aug 12 2015(Updated: )
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | <=4.5.0 | |
Xen XAPI | =4.5.1 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp4 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Server | =12 | |
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
QEMU | <=2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5154 has a high severity rating due to its potential for local guest users to execute arbitrary code on the host.
To fix CVE-2015-5154, you should update your QEMU and Xen to the latest versions that address this vulnerability.
CVE-2015-5154 affects several versions of Xen and QEMU, including Xen 4.5.x and earlier and QEMU up to version 2.3.0.
CVE-2015-5154 is classified as a heap-based buffer overflow vulnerability.
No, CVE-2015-5154 requires local guest user access to be exploited.