SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Xen Vendors:   Xen Project
(Oracle Issues Fix for Oracle Linux) Xen Virtio Request Processing Bug Lets Local Administrative Users on a Guest System Cause Denial of Service Conditions on the Host System
SecurityTracker Alert ID:  1036583
SecurityTracker URL:  http://securitytracker.com/id/1036583
CVE Reference:   CVE-2016-5403   (Links to External Site)
Date:  Aug 9 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.4.x, 4.5.x, 4.6.x, 4.7.x
Description:   A vulnerability was reported in Xen. A local administrative user on the guest system can cause denial of service conditions on the host system.

A local administrative user on the guest system can submit specially crafted virtio request to exceed the virtqueue limit and consume all available memory in QEMU to cause denial of service conditions on the host system.

HVM domains where virtio-net devices are provided to the guest system are affected.

ARM systems are not affected.

PV domains are not affected.

HVM domains running with QEMU stub domains are not affected.

Zhenhao Hong of the 360 Marvel Team reported this vulnerability.

Impact:   A local administrative user on the guest system can cause denial of service conditions on the host system.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-1585.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-1585.html (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Jul 29 2016 Xen Virtio Request Processing Bug Lets Local Administrative Users on a Guest System Cause Denial of Service Conditions on the Host System



 Source Message Contents

Subject:  [El-errata] ELSA-2016-1585 Moderate: Oracle Linux 6 qemu-kvm security update

Oracle Linux Security Advisory ELSA-2016-1585

http://linux.oracle.com/errata/ELSA-2016-1585.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
qemu-guest-agent-0.12.1.2-2.491.el6_8.3.i686.rpm

x86_64:
qemu-guest-agent-0.12.1.2-2.491.el6_8.3.x86_64.rpm
qemu-img-0.12.1.2-2.491.el6_8.3.x86_64.rpm
qemu-kvm-0.12.1.2-2.491.el6_8.3.x86_64.rpm
qemu-kvm-tools-0.12.1.2-2.491.el6_8.3.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/qemu-kvm-0.12.1.2-2.491.el6_8.3.src.rpm



Description of changes:

[0.12.1.2-2.491.el6_8.3]
- kvm-virtio-error-out-if-guest-exceeds-virtqueue-size.patch [bz#1359724]
- Resolves: bz#1359724
   (EMBARGOED CVE-2016-5403 qemu-kvm: Qemu: virtio: unbounded memory 
allocation on host via guest leading to DoS [rhel-6.8.z])

[0.12.1.2-2.491.el6_8.2]
- kvm-vga-add-sr_vbe-register-set.patch [bz#1347192]
- Resolves: bz#1347192
   (Regression from CVE-2016-3712: windows installer fails to start)

[0.12.1.2-2.491.el6_8.1]
- kvm-Add-vga.h-unmodified-from-Linux.patch [bz#1331407]
- kvm-vga.h-remove-unused-stuff-and-reformat.patch [bz#1331407]
- kvm-vga-use-constants-from-vga.h.patch [bz#1331407]
- kvm-vga-Remove-some-should-be-done-in-BIOS-comments.patch [bz#1331407]
- kvm-vga-fix-banked-access-bounds-checking-CVE-2016-3710.patch [bz#1331407]
- kvm-vga-add-vbe_enabled-helper.patch [bz#1331407]
- kvm-vga-factor-out-vga-register-setup.patch [bz#1331407]
- kvm-vga-update-vga-register-setup-on-vbe-changes.patch [bz#1331407]
- kvm-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch 
[bz#1331407]
- Resolves: bz#1331407
   (EMBARGOED CVE-2016-3710 qemu-kvm: qemu: incorrect banked access 
bounds checking in vga module [rhel-6.8.z])



_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC