Vulnerabilities > CVE-2015-5165 - Use of Uninitialized Resource vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

Vulnerable Configurations

Part Description Count
OS
Xen
130
OS
Fedoraproject
2
OS
Suse
2
OS
Debian
2
OS
Redhat
48
OS
Arista
4
OS
Oracle
1
Application
Suse
1
Application
Redhat
3

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1421-1.NASL
    descriptionXen was updated to fix the following security issues : - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344) - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (XSA-140, bsc#939712) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85598
    published2015-08-24
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85598
    titleSUSE SLES11 Security Update : xen (SUSE-SU-2015:1421-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1833.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id86513
    published2015-10-22
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86513
    titleCentOS 6 : qemu-kvm (CESA-2015:1833)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-13404.NASL
    description - Fix crash in qemu_spice_create_display (bz #1163047) * CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536) * CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728) * CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz #1247141) * CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160) * CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-02
    plugin id85727
    published2015-09-02
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85727
    titleFedora 21 : qemu-2.1.3-9.fc21 (2015-13404)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-750.NASL
    descriptionxen was updated to fix 12 security issues. These security issues were fixed : - CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845). - CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS) (bsc#950703). - CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705). - CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706). - CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267). - CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642). - CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367). - CVE-2015-7311: libxl fails to honour readonly flag on disks with qemu-xen (bsc#947165). - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712). - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709). - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634). These non-security issues were fixed : - bsc#907514: Bus fatal error and sles12 sudden reboot has been observed - bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984: Bus fatal error and sles11-SP4 sudden reboot has been observed - bsc#923967: Partner-L3: Bus fatal error and sles11-SP3 sudden reboot has been observed - bsc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores - bsc#945167: Running command xl pci-assignable-add 03:10.1 secondly show errors - bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort - bsc#944463: VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() - bsc#944697: VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue - bsc#925466: Kdump does not work in a XEN environment
    last seen2020-06-05
    modified2015-11-18
    plugin id86909
    published2015-11-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86909
    titleopenSUSE Security Update : xen (openSUSE-2015-750)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150915_QEMU_KVM_ON_SL7_X.NASL
    descriptionAn information leak flaw was found in the way QEMU
    last seen2020-03-18
    modified2015-09-16
    plugin id85961
    published2015-09-16
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85961
    titleScientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20150915)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1479-2.NASL
    descriptionxen was updated to fix the following security issues : - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140) - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139) - CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127) - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137) - CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136) - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85792
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85792
    titleSUSE SLED11 Security Update : xen (SUSE-SU-2015:1479-2)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150922_QEMU_KVM_ON_SL6_X.NASL
    descriptionAn information leak flaw was found in the way QEMU
    last seen2020-03-18
    modified2015-09-23
    plugin id86101
    published2015-09-23
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86101
    titleScientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20150922)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3348.NASL
    descriptionSeveral vulnerabilities were discovered in qemu, a fast processor emulator. - CVE-2015-3214 Matt Tait of Google
    last seen2020-06-01
    modified2020-06-02
    plugin id85754
    published2015-09-03
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85754
    titleDebian DSA-3348-1 : qemu - security update
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1408-1.NASL
    descriptionThis security update of Xen fixes the following issues : - bsc#939712 (XSA-140): QEMU leak of uninitialized heap memory in rtl8139 device model (CVE-2015-5165) - bsc#938344: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM (CVE-2015-5154) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85575
    published2015-08-21
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85575
    titleSUSE SLES11 Security Update : xen (SUSE-SU-2015:1408-1)
  • NASL familyMisc.
    NASL idCITRIX_XENSERVER_CTX201717.NASL
    descriptionThe version of Citrix XenServer running on the remote host is affected by an information disclosure vulnerability due to improper validation of user-supplied input in the C+ mode offload emulation of the RTL8139 network card device model in QEMU. A remote attacker can exploit this to read process heap memory, resulting in the disclosure of sensitive information.
    last seen2020-06-01
    modified2020-06-02
    plugin id85661
    published2015-08-27
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85661
    titleCitrix XenServer QEMU RTL8139 Guest Network Device Information Disclosure (CTX201717)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL63519101.NASL
    descriptionCVE-2014-8106 Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320. CVE-2015-3209 Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. CVE-2015-5165 The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors. CVE-2015-5279 Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets. CVE-2015-7504 Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode. CVE-2015-7512 Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. Impact An attacker may be able to cause a denial of service (DoS) or execute arbitrary code if using the virtual drivers specified in these CVE descriptions.
    last seen2020-03-17
    modified2016-02-17
    plugin id88770
    published2016-02-17
    reporterThis script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88770
    titleF5 Networks BIG-IP : Multiple QEMU vulnerabilities (K63519101)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1793.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id86512
    published2015-10-22
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86512
    titleCentOS 7 : qemu-kvm (CESA-2015:1793)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2016-0051.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - kvm-Add-vga.h-unmodified-from-Linux.patch [bz#1331407] - kvm-vga.h-remove-unused-stuff-and-reformat.patch [bz#1331407] - kvm-vga-use-constants-from-vga.h.patch [bz#1331407] - kvm-vga-Remove-some-should-be-done-in-BIOS-comments.patc h [bz#1331407] - kvm-vga-fix-banked-access-bounds-checking-CVE-2016-3710. patch [bz#1331407] - kvm-vga-add-vbe_enabled-helper.patch [bz#1331407] - kvm-vga-factor-out-vga-register-setup.patch [bz#1331407] - kvm-vga-update-vga-register-setup-on-vbe-changes.patch [bz#1331407] - kvm-vga-make-sure-vga-register-setup-for-vbe-stays-intac .patch - Resolves: bz#1331407 (EMBARGOED CVE-2016-3710 qemu-kvm: qemu: incorrect banked access bounds checking in vga module [rhel-6.8.z]) - Revert
    last seen2020-06-01
    modified2020-06-02
    plugin id91316
    published2016-05-25
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/91316
    titleOracleVM 3.4 : qemu-kvm (OVMSA-2016-0051)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_F06F20DC434711E593AD002590263BF5.NASL
    descriptionThe Xen Project reports : The QEMU model of the RTL8139 network card did not sufficiently validate inputs in the C+ mode offload emulation. This results in uninitialized memory from the QEMU process
    last seen2020-06-01
    modified2020-06-02
    plugin id85486
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85486
    titleFreeBSD : qemu, xen-tools -- QEMU leak of uninitialized heap memory in rtl8139 device model (f06f20dc-4347-11e5-93ad-002590263bf5)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-14361.NASL
    descriptionUse after free in QEMU/Xen block unplug protocol [XSA-139, CVE-2015-5166] QEMU leak of uninitialized heap memory in rtl8139 device model [XSA-140, CVE-2015-5165] Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-02
    plugin id85728
    published2015-09-02
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85728
    titleFedora 23 : xen-4.5.1-6.fc23 (2015-14361)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1739.NASL
    descriptionUpdated qemu-kvm-rhev packages that fix one security issue are now available for Red Hat Enterprise Virtualization Hypervisor 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id117307
    published2018-09-06
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117307
    titleRHEL 7 : qemu-kvm-rhev (RHSA-2015:1739)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1643-1.NASL
    descriptionXen was updated to fix the following security issues : CVE-2015-5154: Host code execution via IDE subsystem CD-ROM. (bsc#938344) CVE-2015-3209: Heap overflow in QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id86203
    published2015-09-30
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86203
    titleSUSE SLES10 Security Update : Xen (SUSE-SU-2015:1643-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3349.NASL
    descriptionSeveral vulnerabilities were discovered in qemu-kvm, a full virtualization solution on x86 hardware. - CVE-2015-5165 Donghai Zhu discovered that the QEMU model of the RTL8139 network card did not sufficiently validate inputs in the C+ mode offload emulation, allowing a malicious guest to read uninitialized memory from the QEMU process
    last seen2020-06-01
    modified2020-06-02
    plugin id85755
    published2015-09-03
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85755
    titleDebian DSA-3349-1 : qemu-kvm - security update
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1404-1.NASL
    descriptionThis security update of Xen fixes the following issues : - bsc#939712 (XSA-140): QEMU leak of uninitialized heap memory in rtl8139 device model (CVE-2015-5165) - bsc#939709 (XSA-139): Use after free in QEMU/Xen block unplug protocol (CVE-2015-5166) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85532
    published2015-08-19
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85532
    titleSUSE SLED11 / SLES11 Security Update : xen (SUSE-SU-2015:1404-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1793.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id85981
    published2015-09-17
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85981
    titleRHEL 7 : qemu-kvm (RHSA-2015:1793)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1833.NASL
    descriptionFrom Red Hat Security Advisory 2015:1833 : Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id86095
    published2015-09-23
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86095
    titleOracle Linux 6 : qemu-kvm (ELSA-2015-1833)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-15946.NASL
    descriptionlibxl fails to honour readonly flag on disks with qemu-xen [XSA-142 (possible fix)] ---- update to xen-4.4.3, including Use after free in QEMU/Xen block unplug protocol [XSA-139, CVE-2015-5166], QEMU leak of uninitialized heap memory in rtl8139 device model [XSA-140, CVE-2015-5165] Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-28
    plugin id86163
    published2015-09-28
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86163
    titleFedora 21 : xen-4.4.3-3.fc21 (2015-15946)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0111.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates in xen
    last seen2020-06-01
    modified2020-06-02
    plugin id85236
    published2015-08-05
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85236
    titleOracleVM 3.3 : xen (OVMSA-2015-0111)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0112.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates in xen.
    last seen2020-06-01
    modified2020-06-02
    plugin id85237
    published2015-08-05
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85237
    titleOracleVM 3.2 : xen (OVMSA-2015-0112)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-479.NASL
    descriptionThis security update fixes a number of security issues in Xen in wheezy. For Debian 7
    last seen2020-03-17
    modified2016-05-18
    plugin id91198
    published2016-05-18
    reporterThis script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/91198
    titleDebian DLA-479-1 : xen security update
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-729.NASL
    descriptionxen was updated to fix 13 security issues. These security issues were fixed : - CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845). - CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS) (bsc#950703). - CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705). - CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706). - CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267). - CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642). - CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367). - CVE-2015-7311: libxl fails to honour readonly flag on disks with qemu-xen (bsc#947165). - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712). - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709). - CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463). - CVE-2015-6815: e1000: infinite loop issue (bsc#944697). - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). This non-security issues was fixed : - bsc#941074: VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working.
    last seen2020-06-05
    modified2015-11-13
    plugin id86863
    published2015-11-13
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86863
    titleopenSUSE Security Update : xen (openSUSE-2015-729)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1479-1.NASL
    descriptionxen was updated to fix the following security issues : - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140) - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139) - CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127) - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137) - CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136) - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85791
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85791
    titleSUSE SLED11 / SLES11 Security Update : xen (SUSE-SU-2015:1479-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1833.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id86098
    published2015-09-23
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86098
    titleRHEL 6 : qemu-kvm (RHSA-2015:1833)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2724-1.NASL
    descriptionIt was discovered that QEMU incorrectly handled a PRDT with zero complete sectors in the IDE functionality. A malicious guest could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9718) Donghai Zhu discovered that QEMU incorrectly handled the RTL8139 driver. A malicious guest could possibly use this issue to read sensitive information from arbitrary host memory. (CVE-2015-5165) Donghai Zhu discovered that QEMU incorrectly handled unplugging emulated block devices. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. This issue only affected Ubuntu 15.04. (CVE-2015-5166) Qinghao Tang and Mr. Zuozhi discovered that QEMU incorrectly handled memory in the VNC display driver. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. This issue only affected Ubuntu 15.04. (CVE-2015-5225) It was discovered that QEMU incorrectly handled the virtio-serial device. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-5745). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85683
    published2015-08-28
    reporterUbuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85683
    titleUbuntu 12.04 LTS / 14.04 LTS / 15.04 : qemu, qemu-kvm vulnerabilities (USN-2724-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1740.NASL
    descriptionUpdated qemu-kvm-rhev packages that fix one security issue and one bug are now available for Red Hat Enterprise Virtualization. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id86000
    published2015-09-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86000
    titleRHEL 6 : qemu-kvm-rhev (RHSA-2015:1740)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1793.NASL
    descriptionFrom Red Hat Security Advisory 2015:1793 : Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id85959
    published2015-09-16
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85959
    titleOracle Linux 7 : qemu-kvm (ELSA-2015-1793)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-13402.NASL
    description - Rebased to version 2.3.1 - Fix crash in qemu_spice_create_display (bz #1163047) - Fix qemu-img map crash for unaligned image (bz #1229394) - CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536) - CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728) - CVE-2015-5158: scsi stack-based buffer overflow (bz #1246025) - CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz #1247141) - CVE-2015-5166: BlockBackend object use after free issue (bz #1249758) - CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160) - CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-08-18
    plugin id85480
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85480
    titleFedora 22 : qemu-2.3.1-1.fc22 (2015-13402)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-15944.NASL
    descriptionlibxl fails to honour readonly flag on disks with qemu-xen [XSA-142 (possible fix)] ---- Use after free in QEMU/Xen block unplug protocol [XSA-139, CVE-2015-5166] QEMU leak of uninitialized heap memory in rtl8139 device model [XSA-140, CVE-2015-5165] Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-28
    plugin id86162
    published2015-09-28
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86162
    titleFedora 22 : xen-4.5.1-8.fc22 (2015-15944)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-13358.NASL
    description - Rebased to version 2.4.0 * Support for virtio-gpu, 2D only * Support for virtio-based keyboard/mouse/tablet emulation * x86 support for memory hot-unplug - ACPI v5.1 table support for
    last seen2020-06-05
    modified2015-08-24
    plugin id85592
    published2015-08-24
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85592
    titleFedora 23 : qemu-2.4.0-1.fc23 (2015-13358)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1384-1.NASL
    descriptionThis security update of Xen fixes the following issues : - bsc#939712 (XSA-140): QEMU leak of uninitialized heap memory in rtl8139 device model (CVE-2015-5165) - bsc#939709 (XSA-139): Use after free in QEMU/Xen block unplug protocol (CVE-2015-5166) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85505
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85505
    titleSUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2015:1384-1)

Redhat

advisories
  • bugzilla
    id1248760
    titleCVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentlibcacard-devel is earlier than 10:1.5.3-86.el7_1.6
            ovaloval:com.redhat.rhsa:tst:20151793001
          • commentlibcacard-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704012
        • AND
          • commentlibcacard-tools is earlier than 10:1.5.3-86.el7_1.6
            ovaloval:com.redhat.rhsa:tst:20151793003
          • commentlibcacard-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704006
        • AND
          • commentlibcacard is earlier than 10:1.5.3-86.el7_1.6
            ovaloval:com.redhat.rhsa:tst:20151793005
          • commentlibcacard is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704008
        • AND
          • commentqemu-kvm-tools is earlier than 10:1.5.3-86.el7_1.6
            ovaloval:com.redhat.rhsa:tst:20151793007
          • commentqemu-kvm-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345002
        • AND
          • commentqemu-img is earlier than 10:1.5.3-86.el7_1.6
            ovaloval:com.redhat.rhsa:tst:20151793009
          • commentqemu-img is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345006
        • AND
          • commentqemu-kvm-common is earlier than 10:1.5.3-86.el7_1.6
            ovaloval:com.redhat.rhsa:tst:20151793011
          • commentqemu-kvm-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704004
        • AND
          • commentqemu-kvm is earlier than 10:1.5.3-86.el7_1.6
            ovaloval:com.redhat.rhsa:tst:20151793013
          • commentqemu-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345004
    rhsa
    idRHSA-2015:1793
    released2015-09-15
    severityModerate
    titleRHSA-2015:1793: qemu-kvm security fix update (Moderate)
  • bugzilla
    id1248760
    titleCVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentqemu-guest-agent is earlier than 2:0.12.1.2-2.479.el6_7.1
            ovaloval:com.redhat.rhsa:tst:20151833001
          • commentqemu-guest-agent is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20121234002
        • AND
          • commentqemu-kvm-tools is earlier than 2:0.12.1.2-2.479.el6_7.1
            ovaloval:com.redhat.rhsa:tst:20151833003
          • commentqemu-kvm-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345002
        • AND
          • commentqemu-img is earlier than 2:0.12.1.2-2.479.el6_7.1
            ovaloval:com.redhat.rhsa:tst:20151833005
          • commentqemu-img is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345006
        • AND
          • commentqemu-kvm is earlier than 2:0.12.1.2-2.479.el6_7.1
            ovaloval:com.redhat.rhsa:tst:20151833007
          • commentqemu-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345004
    rhsa
    idRHSA-2015:1833
    released2015-09-22
    severityModerate
    titleRHSA-2015:1833: qemu-kvm security update (Moderate)
  • rhsa
    idRHSA-2015:1674
  • rhsa
    idRHSA-2015:1683
  • rhsa
    idRHSA-2015:1739
  • rhsa
    idRHSA-2015:1740
rpms
  • libcacard-devel-rhev-10:2.1.2-23.el7_1.8
  • libcacard-rhev-10:2.1.2-23.el7_1.8
  • libcacard-tools-rhev-10:2.1.2-23.el7_1.8
  • qemu-img-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-common-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-debuginfo-10:2.1.2-23.el7_1.8
  • qemu-kvm-tools-rhev-10:2.1.2-23.el7_1.8
  • libcacard-devel-rhev-10:2.1.2-23.el7_1.8
  • libcacard-rhev-10:2.1.2-23.el7_1.8
  • libcacard-tools-rhev-10:2.1.2-23.el7_1.8
  • qemu-img-rhev-10:2.1.2-23.el7_1.8
  • qemu-img-rhev-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-common-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-rhev-debuginfo-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-tools-rhev-10:2.1.2-23.el7_1.8
  • libcacard-rhev-10:2.1.2-23.el7_1.8
  • libcacard-tools-rhev-10:2.1.2-23.el7_1.8
  • qemu-img-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-common-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-debuginfo-10:2.1.2-23.el7_1.8
  • qemu-kvm-tools-rhev-10:2.1.2-23.el7_1.8
  • libcacard-devel-rhev-10:2.1.2-23.el7_1.8
  • libcacard-rhev-10:2.1.2-23.el7_1.8
  • libcacard-tools-rhev-10:2.1.2-23.el7_1.8
  • qemu-img-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-common-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-10:2.1.2-23.el7_1.8
  • qemu-kvm-rhev-debuginfo-10:2.1.2-23.el7_1.8
  • qemu-kvm-tools-rhev-10:2.1.2-23.el7_1.8
  • qemu-img-rhev-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.1
  • libcacard-10:1.5.3-86.el7_1.6
  • libcacard-devel-10:1.5.3-86.el7_1.6
  • libcacard-tools-10:1.5.3-86.el7_1.6
  • qemu-img-10:1.5.3-86.el7_1.6
  • qemu-kvm-10:1.5.3-86.el7_1.6
  • qemu-kvm-common-10:1.5.3-86.el7_1.6
  • qemu-kvm-debuginfo-10:1.5.3-86.el7_1.6
  • qemu-kvm-tools-10:1.5.3-86.el7_1.6
  • qemu-guest-agent-2:0.12.1.2-2.479.el6_7.1
  • qemu-img-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.1
  • qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.1