CVE-2015-5165
12.08.2015, 14:59
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.Enginsight
| Vendor | Product | Version |
|---|---|---|
| xen | xen | 𝑥 ≤ 4.5.0 |
| xen | xen | 4.5.1 |
| debian | debian_linux | 7.0 |
| debian | debian_linux | 8.0 |
| redhat | openstack | 5.0 |
| redhat | openstack | 6.0 |
| redhat | virtualization | 3.0 |
| redhat | enterprise_linux_compute_node_eus | 7.1 |
| redhat | enterprise_linux_compute_node_eus | 7.2 |
| redhat | enterprise_linux_compute_node_eus | 7.3 |
| redhat | enterprise_linux_compute_node_eus | 7.4 |
| redhat | enterprise_linux_compute_node_eus | 7.5 |
| redhat | enterprise_linux_compute_node_eus | 7.6 |
| redhat | enterprise_linux_compute_node_eus | 7.7 |
| redhat | enterprise_linux_desktop | 6.0 |
| redhat | enterprise_linux_eus | 6.7 |
| redhat | enterprise_linux_eus_compute_node | 6.7 |
| redhat | enterprise_linux_for_power_big_endian | 6.0 |
| redhat | enterprise_linux_for_power_big_endian | 7.0 |
| redhat | enterprise_linux_for_power_big_endian_eus | 6.7_ppc64:_ppc64 |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.1_ppc64:_ppc64 |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.2_ppc64:_ppc64 |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.3_ppc64:_ppc64 |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.4_ppc64:_ppc64 |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.5_ppc64:_ppc64 |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.6_ppc64:_ppc64 |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.7_ppc64:_ppc64 |
| redhat | enterprise_linux_for_scientific_computing | 6.0 |
| redhat | enterprise_linux_for_scientific_computing | 7.0 |
| redhat | enterprise_linux_server | 6.0 |
| redhat | enterprise_linux_server | 7.0 |
| redhat | enterprise_linux_server_aus | 7.3 |
| redhat | enterprise_linux_server_aus | 7.4 |
| redhat | enterprise_linux_server_aus | 7.6 |
| redhat | enterprise_linux_server_aus | 7.7 |
| redhat | enterprise_linux_server_eus | 7.1 |
| redhat | enterprise_linux_server_eus | 7.2 |
| redhat | enterprise_linux_server_eus | 7.3 |
| redhat | enterprise_linux_server_eus | 7.4 |
| redhat | enterprise_linux_server_eus | 7.5 |
| redhat | enterprise_linux_server_eus | 7.6 |
| redhat | enterprise_linux_server_eus | 7.7 |
| redhat | enterprise_linux_server_eus_from_rhui | 6.7 |
| redhat | enterprise_linux_server_from_rhui | 6.0 |
| redhat | enterprise_linux_server_from_rhui | 7.0 |
| redhat | enterprise_linux_server_tus | 7.3 |
| redhat | enterprise_linux_server_tus | 7.6 |
| redhat | enterprise_linux_server_tus | 7.7 |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.2 |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.3 |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.4 |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.6 |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.7 |
| redhat | enterprise_linux_workstation | 6.0 |
| redhat | enterprise_linux_workstation | 7.0 |
| arista | eos | 4.12 |
| arista | eos | 4.13 |
| arista | eos | 4.14 |
| arista | eos | 4.15 |
𝑥
= Vulnerable software versions
Debian Releases
Debian Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| qemu |
| ||||||||||||
| xen |
|
Ubuntu Releases
Ubuntu Product | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| qemu |
| ||||||||
| qemu-kvm |
| ||||||||
| xen |
|
Common Weakness Enumeration
References