A flaw was found in the way handle_rx() function handled big packets when mergeable buffers were disabled. A privileged user in the guest could use this flaw to crash the host, or, potentially, escalate their privileges to the ones of the hosting qemu process by corrupting qemu memory. Acknowledgements: This issue was discovered by Michael S. Tsirkin of Red Hat.
Statement: This issue does not affect Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.
*** Bug 1064102 has been marked as a duplicate of this bug. ***
Upstream patch submission: http://article.gmane.org/gmane.linux.network/311012
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1081504]
kernel-3.13.8-200.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.13.9-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0475 https://rhn.redhat.com/errata/RHSA-2014-0475.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node Only Via RHSA-2014:0593 https://rhn.redhat.com/errata/RHSA-2014-0593.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.4 EUS - Server and Compute Node Only Via RHSA-2014:0634 https://rhn.redhat.com/errata/RHSA-2014-0634.html
This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2014:0629 https://rhn.redhat.com/errata/RHSA-2014-0629.html