Qemu emulator built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS. Upstream fix: ------------- -> https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html Reference: ---------- -> https://www.openwall.com/lists/oss-security/2018/10/08/1
Acknowledgments: Name: Daniel Shapira (Twistlock), Arash Tohidi
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1636429] Created xen tracking bugs for this issue: Affects: fedora-all [bug 1636428]
*** Bug 1613562 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:2892 https://access.redhat.com/errata/RHSA-2019:2892
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-10839