CVE-2015-5165
12.08.2015, 14:59
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
xen | xen | 𝑥 ≤ 4.5.0 |
xen | xen | 4.5.1 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
redhat | openstack | 5.0 |
redhat | openstack | 6.0 |
redhat | virtualization | 3.0 |
redhat | enterprise_linux_compute_node_eus | 7.1 |
redhat | enterprise_linux_compute_node_eus | 7.2 |
redhat | enterprise_linux_compute_node_eus | 7.3 |
redhat | enterprise_linux_compute_node_eus | 7.4 |
redhat | enterprise_linux_compute_node_eus | 7.5 |
redhat | enterprise_linux_compute_node_eus | 7.6 |
redhat | enterprise_linux_compute_node_eus | 7.7 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_eus | 6.7 |
redhat | enterprise_linux_eus_compute_node | 6.7 |
redhat | enterprise_linux_for_power_big_endian | 6.0 |
redhat | enterprise_linux_for_power_big_endian | 7.0 |
redhat | enterprise_linux_for_power_big_endian_eus | 6.7_ppc64:_ppc64 |
redhat | enterprise_linux_for_power_big_endian_eus | 7.1_ppc64:_ppc64 |
redhat | enterprise_linux_for_power_big_endian_eus | 7.2_ppc64:_ppc64 |
redhat | enterprise_linux_for_power_big_endian_eus | 7.3_ppc64:_ppc64 |
redhat | enterprise_linux_for_power_big_endian_eus | 7.4_ppc64:_ppc64 |
redhat | enterprise_linux_for_power_big_endian_eus | 7.5_ppc64:_ppc64 |
redhat | enterprise_linux_for_power_big_endian_eus | 7.6_ppc64:_ppc64 |
redhat | enterprise_linux_for_power_big_endian_eus | 7.7_ppc64:_ppc64 |
redhat | enterprise_linux_for_scientific_computing | 6.0 |
redhat | enterprise_linux_for_scientific_computing | 7.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.3 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_aus | 7.7 |
redhat | enterprise_linux_server_eus | 7.1 |
redhat | enterprise_linux_server_eus | 7.2 |
redhat | enterprise_linux_server_eus | 7.3 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_eus | 7.7 |
redhat | enterprise_linux_server_eus_from_rhui | 6.7 |
redhat | enterprise_linux_server_from_rhui | 6.0 |
redhat | enterprise_linux_server_from_rhui | 7.0 |
redhat | enterprise_linux_server_tus | 7.3 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_server_tus | 7.7 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.2 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.3 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.4 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.6 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.7 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
arista | eos | 4.12 |
arista | eos | 4.13 |
arista | eos | 4.14 |
arista | eos | 4.15 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||||||
xen |
|

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||
qemu-kvm |
| ||||||||
xen |
|
Common Weakness Enumeration
References