From ${URL} : Qemu emulator built with the e1000e NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head(TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS. Upstream patch: --------------- -> http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4154c7e03fa55b4cf52509a83d50d6c09d743b7 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
*** Bug 620306 has been marked as a duplicate of this bug. ***
The fix is in upstream commit 4154c7e03fa55b4cf52509a83d50d6c09d743b77 which was already applied to the 2.9.0 release. Security, please add to existing GLSA (bug #616874 and others).
Added to an existing GLSA.
This issue was resolved and addressed in GLSA 201706-03 at https://security.gentoo.org/glsa/201706-03 by GLSA coordinator Yury German (BlueKnight).