The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and previous versions, allows remote malicious users to read process heap memory via unspecified vectors.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
xen xen |
||
xen xen 4.5.1 |
||
fedoraproject fedora 22 |
||
fedoraproject fedora 21 |
||
suse linux enterprise server 11 |
||
suse linux enterprise server 10 |
||
suse linux enterprise debuginfo 11 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |
||
redhat enterprise linux for scientific computing 6.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux for scientific computing 7.0 |
||
redhat openstack 5.0 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux eus 6.7 |
||
redhat enterprise linux server eus 7.2 |
||
redhat enterprise linux for power big endian eus 7.1_ppc64 |
||
redhat enterprise linux server eus 7.1 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux for power big endian 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux server tus 7.3 |
||
redhat enterprise linux compute node eus 7.1 |
||
redhat enterprise linux for power big endian 7.0 |
||
redhat openstack 6.0 |
||
redhat enterprise linux server aus 7.3 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux server eus 7.3 |
||
redhat enterprise linux server eus 7.4 |
||
redhat enterprise linux server eus 7.5 |
||
redhat virtualization 3.0 |
||
redhat enterprise linux server tus 7.6 |
||
redhat enterprise linux server eus 7.6 |
||
redhat enterprise linux server aus 7.6 |
||
redhat enterprise linux server eus 7.7 |
||
redhat enterprise linux server aus 7.7 |
||
redhat enterprise linux server tus 7.7 |
||
redhat enterprise linux server update services for sap solutions 7.6 |
||
redhat enterprise linux server update services for sap solutions 7.7 |
||
redhat enterprise linux server update services for sap solutions 7.4 |
||
redhat enterprise linux server update services for sap solutions 7.3 |
||
redhat enterprise linux for power big endian eus 7.2_ppc64 |
||
redhat enterprise linux compute node eus 7.2 |
||
redhat enterprise linux compute node eus 7.3 |
||
redhat enterprise linux compute node eus 7.4 |
||
redhat enterprise linux compute node eus 7.5 |
||
redhat enterprise linux compute node eus 7.6 |
||
redhat enterprise linux compute node eus 7.7 |
||
redhat enterprise linux server update services for sap solutions 7.2 |
||
redhat enterprise linux for power big endian eus 7.3_ppc64 |
||
redhat enterprise linux for power big endian eus 7.4_ppc64 |
||
redhat enterprise linux for power big endian eus 7.5_ppc64 |
||
redhat enterprise linux for power big endian eus 7.6_ppc64 |
||
redhat enterprise linux for power big endian eus 7.7_ppc64 |
||
redhat enterprise linux server eus from rhui 6.7 |
||
redhat enterprise linux server from rhui 7.0 |
||
redhat enterprise linux for power big endian eus 6.7_ppc64 |
||
redhat enterprise linux eus compute node 6.7 |
||
redhat enterprise linux server from rhui 6.0 |
||
arista eos 4.15 |
||
arista eos 4.14 |
||
arista eos 4.13 |
||
arista eos 4.12 |
||
oracle linux 7 |
Five guest-host escalation SNAFUs might be stretching the virtual friendship
The Xen project has revealed another two bugs in the QEMU hypervisor and is now wondering the extent to which it should support the buggy code. The first of the flaws, CVE-2015-5165, means “A guest may be able to read sensitive host-level data relating to itself which resides in the QEMU process” and impacts “All Xen systems running x86 HVM guests without stubdomains which have been configured with an emulated RTL8139 driver mode”. There's a workaround and the Xen team are asking you to ...