First published: Wed Aug 12 2015(Updated: )
Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =21 | |
Fedora | =22 | |
Xen XAPI | <=4.5.0 | |
Xen XAPI | =4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5166 is considered a high severity vulnerability due to its potential to allow privilege escalation for local HVM guest users.
To fix CVE-2015-5166, update to the latest version of QEMU or Xen that addresses this vulnerability.
CVE-2015-5166 affects users of Xen versions up to and including 4.5.1 and specific Fedora versions 21 and 22.
CVE-2015-5166 is caused by a use-after-free error in QEMU when unplugging emulated block devices.
Exploiting CVE-2015-5166 can allow an attacker to gain elevated privileges on the host system by manipulating block device states.