Bug 1369012 (CVE-2016-6835) - CVE-2016-6835 Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation
Summary: CVE-2016-6835 Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_heade...
Alias: CVE-2016-6835
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1369015 1369018 1369019 1370368 1370369 1370370 1370371 1370372 1370373 1378403 1378404
Blocks: 1347787
TreeView+ depends on / blocked
Reported: 2016-08-22 10:37 UTC by Prasad J Pandit
Modified: 2021-10-21 00:55 UTC (History)
33 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2021-10-21 00:55:08 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:2392 0 normal SHIPPED_LIVE Important: qemu-kvm-rhev security, bug fix, and enhancement update 2017-08-01 20:04:36 UTC

Description Prasad J Pandit 2016-08-22 10:37:52 UTC
Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support is
vulnerable to an OOB access issue. In that it does not check if packet headers
does not check for IP header length. It could lead to a OOB access when
reading further packet data.

A privileged user inside guest could use this issue to crash the Qemu process
instance or potentially execute arbitrary code on the host, with privileges of
the Qemu process.

Upstream patch:
  -> https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html

  -> http://www.openwall.com/lists/oss-security/2016/08/18/4

Comment 1 Prasad J Pandit 2016-08-22 10:38:32 UTC

Name: Li Qiang (Qihoo 360 Inc.)

Comment 2 Prasad J Pandit 2016-08-22 10:39:41 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1369015]

Comment 12 errata-xmlrpc 2017-08-02 04:44:51 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2017:2392 https://access.redhat.com/errata/RHSA-2017:2392

Note You need to log in before you can comment on or make changes to this bug.