Qemu emulator built with the AMD PC-Net II (Am79C970A) emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS. Upstream fix: ------------- -> https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03268.html Reference: ---------- -> https://www.openwall.com/lists/oss-security/2018/10/08/1
Acknowledgments: Name: Daniel Shapira (Twistlock), Arash Tohidi
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1636775] Created xen tracking bugs for this issue: Affects: fedora-all [bug 1636776]
*** Bug 1613561 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:2892 https://access.redhat.com/errata/RHSA-2019:2892
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-17962