Qemu emulator built to use 'qemu_map_ram_ptr' to access guests' ram block area is vulnerable to a OOB r/w access issue. It could occur during a DMA operation. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS. Upstream patch: --------------- -> https://git.qemu.org/?p=qemu.git;a=commitdiff;h=04bf2526ce87f21b32c9acba1c5518708c243ad0 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/07/17/4
Acknowledgments: Name: Alex
Created xen tracking bugs for this issue: Affects: fedora-all [bug 1471640]
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1471639]
This issue has been addressed in the following products: RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:3369 https://access.redhat.com/errata/RHSA-2017:3369
This issue has been addressed in the following products: Red Hat OpenStack Platform 8.0 (Liberty) Via RHSA-2017:3471 https://access.redhat.com/errata/RHSA-2017:3471
This issue has been addressed in the following products: Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:3470 https://access.redhat.com/errata/RHSA-2017:3470
This issue has been addressed in the following products: Red Hat OpenStack Platform 11.0 (Ocata) Via RHSA-2017:3466 https://access.redhat.com/errata/RHSA-2017:3466
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2017:3474 https://access.redhat.com/errata/RHSA-2017:3474
This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Via RHSA-2017:3472 https://access.redhat.com/errata/RHSA-2017:3472
This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Via RHSA-2017:3473 https://access.redhat.com/errata/RHSA-2017:3473