A potential integer overflow issue was found in the QEMU emulator. It could occur when a packet with large packet size is accepted and processed. A user inside guest could use this flaw to crash the Qemu process resulting in DoS. Upstream fix: ------------- -> https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03267.html -> https://git.qemu.org/?p=qemu.git;a=commit;h=25c01bd19d0e4b66f357618aeefda1ef7a41e21a Reference: ---------- -> https://www.openwall.com/lists/oss-security/2018/10/08/1
Acknowledgments: Name: Daniel Shapira (Twistlock)
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1636782] Created xen tracking bugs for this issue: Affects: fedora-all [bug 1636783]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2166 https://access.redhat.com/errata/RHSA-2019:2166
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-17963
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 14.0 (Rocky) Via RHSA-2019:2425 https://access.redhat.com/errata/RHSA-2019:2425
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Red Hat Virtualization Engine 4.3 Via RHSA-2019:2553 https://access.redhat.com/errata/RHSA-2019:2553