A heap buffer overflow issue was found in the way Slirp networking back-end in QEMU processes fragmented packets. It could occur while reassembling the fragmented datagrams of an incoming packet. A privileged user/process inside guest could use this flaw to crash the QEMU process resulting in DoS OR potentially leverage it to execute arbitrary code on the host with privileges of the QEMU process. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg01012.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2018/06/07/1
Acknowledgments: Name: Jskz - Zero Day Initiative (trendmicro.com)
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1586249]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2462 https://access.redhat.com/errata/RHSA-2018:2462
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2762 https://access.redhat.com/errata/RHSA-2018:2762
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Red Hat OpenStack Platform 12.0 (Pike) Red Hat OpenStack Platform 8.0 (Liberty) Red Hat OpenStack Platform 9.0 (Mitaka) Red Hat OpenStack Platform 13.0 (Queens) Via RHSA-2018:2822 https://access.redhat.com/errata/RHSA-2018:2822
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2018:2887 https://access.redhat.com/errata/RHSA-2018:2887
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:2892 https://access.redhat.com/errata/RHSA-2019:2892