Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support, with network abstraction layer is vulnerable to an integer overflow issue. It could occur while initialisation of a new packets in the device. A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS. Upstream patch: --------------- -> http://git.qemu.org/?p=qemu.git;a=commit;h=47882fa4975bf0b58dd74474329fdd7154e8f04c Reference: ---------- -> http://www.openwall.com/lists/oss-security/2016/08/19/10
Acknowledgments: Name: Li Qiang (Qihoo 360 Inc.)
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1369032]
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Red Hat OpenStack Platform 11.0 (Ocata) Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Red Hat OpenStack Platform 8.0 (Liberty) Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:2408 https://access.redhat.com/errata/RHSA-2017:2408
This issue has been addressed in the following products: RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:2392 https://access.redhat.com/errata/RHSA-2017:2392