Vulnerability Description
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | <= 4.5.0 |
| Fedoraproject | Fedora | 21 |
| Suse | Linux Enterprise Debuginfo | 11 |
| Suse | Linux Enterprise Server | 10 |
| Debian | Debian Linux | 7.0 |
| Redhat | Openstack | 5.0 |
| Redhat | Virtualization | 3.0 |
| Redhat | Enterprise Linux Compute Node Eus | 7.1 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Eus | 6.7 |
| Redhat | Enterprise Linux Eus Compute Node | 6.7 |
| Redhat | Enterprise Linux For Power Big Endian | 6.0 |
| Redhat | Enterprise Linux For Power Big Endian Eus | 6.7_ppc64 |
| Redhat | Enterprise Linux For Scientific Computing | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.3 |
| Redhat | Enterprise Linux Server Eus | 7.1 |
| Redhat | Enterprise Linux Server Eus From Rhui | 6.7 |
| Redhat | Enterprise Linux Server From Rhui | 6.0 |
| Redhat | Enterprise Linux Server Tus | 7.3 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.Issue TrackingMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.Issue TrackingMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.Issue TrackingMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.htmlIssue TrackingMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.htmlIssue TrackingMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1674.htmlIssue TrackingThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1683.htmlIssue TrackingThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1739.htmlIssue TrackingThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1740.htmlIssue TrackingThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1793.htmlIssue TrackingThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1833.htmlIssue TrackingThird Party Advisory
- http://support.citrix.com/article/CTX201717Broken LinkThird Party Advisory
- http://www.debian.org/security/2015/dsa-3348Third Party Advisory
- http://www.debian.org/security/2015/dsa-3349Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.hThird Party Advisory
FAQ
What is CVE-2015-5165?
CVE-2015-5165 is a vulnerability with a CVSS score of 9.3 (HIGH). The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
How severe is CVE-2015-5165?
CVE-2015-5165 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5165?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Fedoraproject Fedora, Suse Linux Enterprise Debuginfo, Suse Linux Enterprise Server, Debian Debian Linux.