FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

qemu, xen-tools -- QEMU leak of uninitialized heap memory in rtl8139 device model

Affected packages
qemu <= 0.11.1_20
0.12 <= qemu <= 2.3.0_2
qemu-devel <= 0.11.1_20
0.12 <= qemu-devel <= 2.3.0_2
qemu-sbruno < 2.4.50.g20150814
qemu-user-static < 2.4.50.g20150814
xen-tools < 4.5.1

Details

VuXML ID f06f20dc-4347-11e5-93ad-002590263bf5
Discovery 2015-08-03
Entry 2015-08-17
Modified 2015-08-19

The Xen Project reports:

The QEMU model of the RTL8139 network card did not sufficiently validate inputs in the C+ mode offload emulation. This results in uninitialised memory from the QEMU process's heap being leaked to the domain as well as to the network.

A guest may be able to read sensitive host-level data relating to itself which resides in the QEMU process.

Such information may include things such as information relating to real devices backing emulated devices or passwords which the host administrator does not intend to share with the guest admin.

References

CVE Name CVE-2015-5165
URL http://git.qemu.org/?p=qemu.git;a=commit;h=2a3612ccc1fa9cea77bd193afbfe21c77e7e91ef
URL http://xenbits.xen.org/xsa/advisory-140.html