CVE-2015-5166
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
12/08/2015
Last modified:
12/04/2025
Description
Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.5.0 (including) | |
| cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html
- http://www.securityfocus.com/bid/76152
- http://www.securitytracker.com/id/1033175
- http://xenbits.xen.org/xsa/advisory-139.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html
- http://www.securityfocus.com/bid/76152
- http://www.securitytracker.com/id/1033175
- http://xenbits.xen.org/xsa/advisory-139.html



