Bug 1366369 (CVE-2016-6836)
Summary: | CVE-2016-6836 Qemu: net: vmxnet: Information leakage in vmxnet3_complete_packet | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Prasad Pandit <ppandit> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | ASSIGNED --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | ailan, amit.shah, berrange, carnil, cfergeau, crobinso, dwmw2, imammedo, itamar, jen, knoel, m.a.young, mkenneth, mrezanin, mst, pbonzini, ppandit, rjones, virt-maint, virt-maint, vkuznets, xen-maint |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
Quick Emulator (QEMU) built with the VMWARE VMXNET3 NIC device support is vulnerable to an information leakage issue. The vulnerability could occur while processing the transmit(tx) queue when it reaches the end of a packet. A privileged user inside guest could use this vulnerability to leak host memory bytes to a guest.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-12-21 13:01:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1366370, 1398132, 1398133, 1398134, 1398135, 1398136, 1398137, 1398138, 1398139, 1398140, 1398141 | ||
Bug Blocks: | 1346338, 1370384 |
Description
Prasad Pandit
2016-08-11 19:15:54 UTC
Acknowledgments: Name: Li Qiang (Qihoo 360 Inc.) Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1366370] CVE assignment: http://seclists.org/oss-sec/2016/q3/311 The bug does not affect neither RHEL nor OpenStack. The source code file for this BZ is not got compiled for all RHEL repository, so we won't suffer this vulnerability potentially. |