Bug 1369012 (CVE-2016-6835)

Summary: CVE-2016-6835 Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation
Product: [Other] Security Response Reporter: Prasad Pandit <ppandit>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ailan, amit.shah, apevec, areis, berrange, cfergeau, chrisw, cvsbot-xmlrpc, drjones, dwmw2, imammedo, itamar, jen, jschluet, knoel, lhh, lpeer, markmc, m.a.young, mkenneth, mrezanin, mst, pbonzini, ppandit, rbryant, rjones, sclewis, srevivo, tdecacqu, virt-maint, virt-maint, vkuznets, xen-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-21 00:55:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1369015, 1369018, 1369019, 1370368, 1370369, 1370370, 1370371, 1370372, 1370373, 1378403, 1378404    
Bug Blocks: 1347787    

Description Prasad Pandit 2016-08-22 10:37:52 UTC
Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support is
vulnerable to an OOB access issue. In that it does not check if packet headers
does not check for IP header length. It could lead to a OOB access when
reading further packet data.

A privileged user inside guest could use this issue to crash the Qemu process
instance or potentially execute arbitrary code on the host, with privileges of
the Qemu process.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html


Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2016/08/18/4

Comment 1 Prasad Pandit 2016-08-22 10:38:32 UTC
Acknowledgments:

Name: Li Qiang (Qihoo 360 Inc.)

Comment 2 Prasad Pandit 2016-08-22 10:39:41 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1369015]

Comment 12 errata-xmlrpc 2017-08-02 04:44:51 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2017:2392 https://access.redhat.com/errata/RHSA-2017:2392