9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
qemu-kvm-rhev is vulnerable to information disclosure attacks. The vulnerability exists as the C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html
lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html
lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html
lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
rhn.redhat.com/errata/RHSA-2015-1674.html
rhn.redhat.com/errata/RHSA-2015-1683.html
rhn.redhat.com/errata/RHSA-2015-1739.html
rhn.redhat.com/errata/RHSA-2015-1740.html
rhn.redhat.com/errata/RHSA-2015-1793.html
rhn.redhat.com/errata/RHSA-2015-1833.html
support.citrix.com/article/CTX201717
www.debian.org/security/2015/dsa-3348
www.debian.org/security/2015/dsa-3349
www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
www.securityfocus.com/bid/76153
www.securitytracker.com/id/1033176
xenbits.xen.org/xsa/advisory-140.html
access.redhat.com/errata/RHSA-2015:1674
access.redhat.com/errata/RHSA-2015:1683
access.redhat.com/errata/RHSA-2015:1718
access.redhat.com/errata/RHSA-2015:1739
access.redhat.com/errata/RHSA-2015:1740
access.redhat.com/errata/RHSA-2015:1793
access.redhat.com/errata/RHSA-2015:1833
access.redhat.com/security/cve/CVE-2015-5165
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1248760
rhn.redhat.com/errata/RHSA-2015-1674.html
www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13