First published: Wed Aug 12 2015(Updated: )
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | <=4.5.0 | |
Xen XAPI | =4.5.1 | |
Red Hat Fedora | =21 | |
Red Hat Fedora | =22 | |
SUSE Linux Enterprise Debuginfo | =11-sp1 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp1 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux Compute Node EUS | =7.1 | |
Red Hat Enterprise Linux Compute Node EUS | =7.2 | |
Red Hat Enterprise Linux Compute Node EUS | =7.3 | |
Red Hat Enterprise Linux Compute Node EUS | =7.4 | |
Red Hat Enterprise Linux Compute Node EUS | =7.5 | |
Red Hat Enterprise Linux Compute Node EUS | =7.6 | |
Red Hat Enterprise Linux Compute Node EUS | =7.7 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.7 | |
Red Hat Enterprise Linux | =6.7 | |
Red Hat Enterprise Linux for Power, big endian | =6.0 | |
Red Hat Enterprise Linux for Power, big endian | =7.0 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =6.7_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.1_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.2_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.3_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.4_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.5_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.6_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.7_ppc64 | |
Red Hat Enterprise Linux for Scientific Computing | =6.0 | |
Red Hat Enterprise Linux for Scientific Computing | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.1 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.7 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =7.2 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =7.3 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =7.4 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =7.6 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Arista EOS | =4.12 | |
Arista EOS | =4.13 | |
Arista EOS | =4.14 | |
Arista EOS | =4.15 | |
Oracle Linux | =7-0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5165 has a high severity rating due to its potential to allow remote attackers to read sensitive process heap memory.
To fix CVE-2015-5165, you should update to the latest version of the affected software that includes the security patch.
CVE-2015-5165 affects certain versions of Xen, Fedora, SUSE Linux, Debian, and various Red Hat products.
Yes, CVE-2015-5165 can be exploited remotely by attackers, posing a significant risk to vulnerable systems.
The potential effects of CVE-2015-5165 include unauthorized access to sensitive information and process memory leakage.