First published: Wed Aug 12 2015(Updated: )
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.5.0 | |
Xen xen-unstable | =4.5.1 | |
Fedora | =21 | |
Fedora | =22 | |
SUSE Linux Enterprise Debuginfo | =11-sp1 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp1 | |
Debian | =7.0 | |
Debian | =8.0 | |
redhat openstack | =5.0 | |
redhat openstack | =6.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux Compute Node EUS | =7.1 | |
Red Hat Enterprise Linux Compute Node EUS | =7.2 | |
Red Hat Enterprise Linux Compute Node EUS | =7.3 | |
Red Hat Enterprise Linux Compute Node EUS | =7.4 | |
Red Hat Enterprise Linux Compute Node EUS | =7.5 | |
Red Hat Enterprise Linux Compute Node EUS | =7.6 | |
Red Hat Enterprise Linux Compute Node EUS | =7.7 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.7 | |
Red Hat Enterprise Linux | =6.7 | |
redhat enterprise Linux for power big endian | =6.0 | |
redhat enterprise Linux for power big endian | =7.0 | |
redhat enterprise Linux for power big endian eus | =6.7_ppc64 | |
redhat enterprise Linux for power big endian eus | =7.1_ppc64 | |
redhat enterprise Linux for power big endian eus | =7.2_ppc64 | |
redhat enterprise Linux for power big endian eus | =7.3_ppc64 | |
redhat enterprise Linux for power big endian eus | =7.4_ppc64 | |
redhat enterprise Linux for power big endian eus | =7.5_ppc64 | |
redhat enterprise Linux for power big endian eus | =7.6_ppc64 | |
redhat enterprise Linux for power big endian eus | =7.7_ppc64 | |
redhat enterprise Linux for scientific computing | =6.0 | |
redhat enterprise Linux for scientific computing | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server eus | =7.1 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server eus | =7.7 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.7 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =7.0 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux server update services for sap solutions | =7.2 | |
redhat enterprise Linux server update services for sap solutions | =7.3 | |
redhat enterprise Linux server update services for sap solutions | =7.4 | |
redhat enterprise Linux server update services for sap solutions | =7.6 | |
redhat enterprise Linux server update services for sap solutions | =7.7 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Arista EOS | =4.12 | |
Arista EOS | =4.13 | |
Arista EOS | =4.14 | |
Arista EOS | =4.15 | |
Oracle Linux | =7-0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5165 has a high severity rating due to its potential to allow remote attackers to read sensitive process heap memory.
To fix CVE-2015-5165, you should update to the latest version of the affected software that includes the security patch.
CVE-2015-5165 affects certain versions of Xen, Fedora, SUSE Linux, Debian, and various Red Hat products.
Yes, CVE-2015-5165 can be exploited remotely by attackers, posing a significant risk to vulnerable systems.
The potential effects of CVE-2015-5165 include unauthorized access to sensitive information and process memory leakage.