Due to inconsistent error checking, Qemu emulator allows malicious PRDT data to flow from a guest to the host's IDE or AHCI controllers. This could result in infinite loop or memory leakage on the host leading to unbounded resource consumption. A privileged user inside guest could use this flaw to crash the system, resulting in DoS. Upstream fix: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8 CVE request: http://seclists.org/oss-sec/2015/q1/984
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1205322] Affects: epel-all [bug 1205323]
*** This bug has been marked as a duplicate of bug 1204919 ***