{"id":"CVE-2015-5165","details":"The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.","modified":"2026-04-16T06:17:32.078853825Z","published":"2015-08-12T14:59:24Z","related":["SUSE-SU-2015:1384-1","SUSE-SU-2015:1404-1","SUSE-SU-2015:1408-1","SUSE-SU-2015:1421-1","SUSE-SU-2015:1479-1","SUSE-SU-2015:1479-2"],"references":[{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1674.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1683.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1739.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1740.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1793.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1833.html"},{"type":"ADVISORY","url":"http://support.citrix.com/article/CTX201717"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3348"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3349"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/76153"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033176"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-140.html"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/advisory-140.html"},{"type":"REPORT","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html"},{"type":"REPORT","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html"},{"type":"REPORT","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1674.html"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1683.html"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1739.html"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1740.html"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1793.html"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1833.html"},{"type":"WEB","url":"http://support.citrix.com/article/CTX201717"}],"schema_version":"1.7.5"}