Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.
References
Configurations
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html - | |
References | () http://www.securityfocus.com/bid/76152 - | |
References | () http://www.securitytracker.com/id/1033175 - | |
References | () http://xenbits.xen.org/xsa/advisory-139.html - Patch, Vendor Advisory |
Information
Published : 2015-08-12 14:59
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5166
Mitre link : CVE-2015-5166
CVE.ORG link : CVE-2015-5166
JSON object : View
Products Affected
xen
- xen
fedoraproject
- fedora
CWE
CWE-264
Permissions, Privileges, and Access Controls