Bug 1368990 (CVE-2016-6834) - CVE-2016-6834 Qemu: net: vmxnet3: an infinite loop during packet fragmentation
Summary: CVE-2016-6834 Qemu: net: vmxnet3: an infinite loop during packet fragmentation
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-6834
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1368991
Blocks: 1330535
TreeView+ depends on / blocked
 
Reported: 2016-08-22 09:51 UTC by Prasad Pandit
Modified: 2021-02-17 03:26 UTC (History)
35 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-06-08 02:57:36 UTC
Embargoed:


Attachments (Terms of Use)

Description Prasad Pandit 2016-08-22 09:51:37 UTC
Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support,
with network abstraction layer is vulnerable to an infinite loop issue.
It could occur while fragmenting packets in the device.

A privileged user inside guest could use this flaw to crash the Qemu instance
resulting in DoS.

Upstream patch:
---------------
  -> http://git.qemu.org/?p=qemu.git;a=commit;h=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2016/08/18/7

Comment 1 Prasad Pandit 2016-08-22 09:52:11 UTC
Acknowledgments:

Name: Li Qiang (Qihoo 360 Inc.)

Comment 2 Prasad Pandit 2016-08-22 09:53:07 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1368991]


Note You need to log in before you can comment on or make changes to this bug.