SB2015082611 - Fedora 23 update for xen 



SB2015082611 - Fedora 23 update for xen

Published: August 26, 2015 Updated: April 24, 2025

Security Bulletin ID SB2015082611
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2015-5166)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.


2) Information disclosure (CVE-ID: CVE-2015-5165)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.


Remediation

Install update from vendor's website.