Quick Emulator(Qemu) built with a macro ROUND_UP(n, d), used to promote number 'n' to the nearest multiple of 'd', is vulnerable to an integer overflow issue. It could occur if 'd' is unsigned and differs in type from 'n'. A user/process could use this flaw to crash the Qemu process resulting in DoS. Upstream patch: --------------- -> https://git.qemu.org/?p=qemu.git;a=commit;h=2098b073f398cd628c09c5a78537a6854 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2018/01/19/1
Acknowledgments: Name: Eric Blake (Red Hat Inc.)
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1536380] Created xen tracking bugs for this issue: Affects: fedora-all [bug 1536379]