Bug 1554930

Summary: incorrect locking (possible use-after-free) with bug 1481593 fix [rhel-7.5.z]
Product: Red Hat Enterprise Linux 7 Reporter: Oneata Mircea Teodor <toneata>
Component: qemu-kvm-maAssignee: Miroslav Rezanina <mrezanin>
Status: CLOSED ERRATA QA Contact: Qunfang Zhang <qzhang>
Severity: high Docs Contact:
Priority: high    
Version: 7.5CC: chayang, coli, jen, jherrman, juzhang, knoel, michen, mtessun, ngu, pbonzini, qzhang, salmy, toneata, virt-maint
Target Milestone: rcKeywords: Regression, ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: qemu-kvm-ma-2.10.0-21.el7_5.1 Doc Type: Bug Fix
Doc Text:
Previously, system calls to the address_space_to_flatview function in some cases targeted functions that were not sufficiently synchronized by the read-copy-update (RCU) mechanism. This was a potential security risk. The affected system calls have been fixed, and they can no longer be used as a vector for malicious code.
Story Points: ---
Clone Of: 1553775 Environment:
Last Closed: 2018-04-10 19:13:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1553775    
Bug Blocks:    

Description Oneata Mircea Teodor 2018-03-13 15:18:02 UTC
This bug has been copied from bug #1553775 and has been proposed to be backported to 7.5 z-stream (EUS).

Comment 3 Miroslav Rezanina 2018-03-14 06:44:31 UTC
Fix included in qemu-kvm-ma-2.10.0-21.el7.1

Comment 8 errata-xmlrpc 2018-04-10 19:13:01 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:1054