Security Advisory Moderate: qemu-kvm-rhev security update

Advisory: RHSA-2015:1683-1
Type: Security Advisory
Severity: Moderate
Issued on: 2015-08-25
Last updated on: 2015-08-25
Affected Products: Red Hat OpenStack 5.0 for RHEL 6
Red Hat OpenStack 5.0 for RHEL 7
CVEs ( CVE-2015-5165


Updated qemu-kvm-rhev packages that fix one security issue are now
available for Red Hat Enterprise Linux OpenStack Platform 5.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the
user-space component for running virtual machines using KVM.

An information leak flaw was found in the way QEMU's RTL8139 emulation
implementation processed network packets under RTL8139 controller's C+ mode
of operation. An unprivileged guest user could use this flaw to read up to
65 KB of uninitialized QEMU heap memory. (CVE-2015-5165)

Red Hat would like to thank the Xen project for reporting this issue.
Upstream acknowledges Donghai Zhu of Alibaba as the original reporter.

All qemu-kvm-rhev users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, shut down all running virtual machines. Once all virtual
machines have shut down, start them again for this update to take effect.


Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

Updated packages

Red Hat OpenStack 5.0 for RHEL 6

File outdated by:  RHSA-2017:1441
    MD5: 82692d7553535ea04da0da5998eb4a0c
SHA-256: fc2f9812979035336f141b7e0301cec0f5864e9c97d31121206f6b8e45e3ef48
File outdated by:  RHSA-2017:1441
    MD5: c4d47c4eafb74cd816296154a852a7e5
SHA-256: 30c035203625a7cf68c1d9440dc1cb9335e7760a2f6c9931e1b8a476a52ab599
File outdated by:  RHSA-2017:1441
    MD5: 3647eb749389b73025911e1995325ff0
SHA-256: a37ab4a3833dfbe055759d17f496282aa2259e91cc01c575ebfc9b79472531dc
File outdated by:  RHSA-2017:1441
    MD5: d1ddee6272e5e84c1765e0c32d180428
SHA-256: 9e7cc92fdbfdb09ca17d5950599f27bcd1ab94ba6456b60a9cb7bc18f12f46a4
File outdated by:  RHSA-2017:1441
    MD5: 6c543bf2b1698cd24785415740d8b486
SHA-256: e5346a88d439694e6c60515062f4445c79b2b98966b4e7fd3456253b1cdff89d
Red Hat OpenStack 5.0 for RHEL 7

File outdated by:  RHSA-2017:0980
    MD5: 3b0b92d662fbcac782980c1acdc8cff3
SHA-256: 5a204ee8b4b5a840b889b5685a06fe20d3febf7770706c68af4398bb10636657
File outdated by:  RHSA-2016:1655
    MD5: 0b17c120646768048cc3c481097afb35
SHA-256: a948204698ff24306291d63c0b08d592ea802e355e3063d863f67e3818c1de1f
File outdated by:  RHSA-2016:1655
    MD5: d513a4c986bdd5aba1c2a2ae3aca8212
SHA-256: 0a27a6c89cf60a196f08df3f59ed181339de8a31dd4ac4b24516a28a0b0d5912
File outdated by:  RHSA-2016:1655
    MD5: 80f3636b437a7563ba07a1b97da36eee
SHA-256: 665d62e42cb6ee748b97c3649117429943a358707522f3c99a9544df6f6b3e0e
File outdated by:  RHSA-2017:0980
    MD5: 9464c920c09f9088442972f9d1b8eb69
SHA-256: 051eccb864d190d82659648022cf40b209189f6fbc4eaab16e1995873da90278
File outdated by:  RHSA-2017:0980
    MD5: 6ae8f9fbc1a65b708883659ec44ee5ba
SHA-256: 178d382a01e65cf82403acf68950c2bd99af3f19e3a6e2c0c371bfb5866628fa
File outdated by:  RHSA-2017:0980
    MD5: 772225f803a0e86ccfae162678505c6e
SHA-256: f7206fd580793b77fc7a616f4452de6d632112364a2b12356c594bbf728ef8f2
File outdated by:  RHSA-2017:0980
    MD5: 11064a5d465e5ad6966202bc3d24d35c
SHA-256: a6df340ae207b44ae626eaa5c26ff7fac095b7b6d13ad8a6bc495a7891a29f39
File outdated by:  RHSA-2017:0980
    MD5: f92840880c7cbacea4da7a236afa3348
SHA-256: 30997759df8a254416674aba102325854447f63f1949fc7a15f7d20ef8a6ccfc
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1248760 - CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at