Quick emulator(Qemu) built with the Slirp networking support is vulnerable to an use-after-free issue. It occurs due to Socket referenced from multiple packets is freed while responding to a message. A user/process could use this flaw to crash the Qemu process on the host resulting in DoS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05201.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/08/29/6
Acknowledgments: Name: Wjjzhang (Tencent.com)
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1486401]
Changed openstack to affected / fix. We will be getting this from y-stream
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1508739]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0816 https://access.redhat.com/errata/RHSA-2018:0816
This issue has been addressed in the following products: Red Hat Virtualization 4 for RHEL-7 Via RHSA-2018:1104 https://access.redhat.com/errata/RHSA-2018:1104
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Red Hat OpenStack Platform 11.0 (Ocata) Red Hat OpenStack Platform 8.0 (Liberty) Red Hat OpenStack Platform 9.0 (Mitaka) Red Hat OpenStack Platform 12.0 (Pike) Via RHSA-2018:1113 https://access.redhat.com/errata/RHSA-2018:1113