From ${URL} : Qemu emulator built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head(TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS. Upstream patch - -------------- -> https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html Reference: - ---------- -> https://bugzilla.redhat.com/show_bug.cgi?id=1298570 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
fixed landed upstream here: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=dd793a74882477ca38d49e191110c17dfee51dcc
this is in qemu-2.5.0-r2 and is fine for stable
Added to existing GLSA.
Clean as part of bug #567420
This issue was resolved and addressed in GLSA 201604-01 at https://security.gentoo.org/glsa/201604-01 by GLSA coordinator Yury German (BlueKnight).