Hide Forgot
An infinite loop issue was found in the e1000e NIC emulation code of QEMU. It could occur in the e1000e_write_packet_to_guest() routine while processing receive descriptor data if the address of the descriptor's data buffer was set to zero. A privileged guest user may exploit this issue to crash the QEMU process on the host, resulting in a denial of service.
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1895051]
Hi It looks there is upstream this old commit: https://git.qemu.org/?p=qemu.git;a=commit;h=4154c7e03fa55b4cf52509a83d50d6c09d743b77 But this would be fixed upstream since v2.9.0-rc0. Is this CVE related to this fix? Regards, Salvatore
(In reply to Salvatore Bonaccorso from comment #8) > Hi > > It looks there is upstream this old commit: > > https://git.qemu.org/?p=qemu.git;a=commit; > h=4154c7e03fa55b4cf52509a83d50d6c09d743b77 > > But this would be fixed upstream since v2.9.0-rc0. > > Is this CVE related to this fix? OTOH, this would be CVE-2017-9310 so I assume it is something different? Regards, Salvatore
Okay I guess https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg03552.html might be the better answer here. Is this correct?
Hi Salvatore, In reply to comment #10: > Okay I guess > https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg03552.html might > be the better answer here. Is this correct? Correct, this is different from CVE-2017-9310 although somewhat related. I will add a reference to the patch here, once it gets accepted upstream. Regards, Mauro
Hi Mauro Thanks a lot for the confirmation! Regards, Salvatore
Acknowledgments: Name: Cheolwoo Myung, Gaoning Pan (Zhejiang University)
Upstream fix: https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg03185.html
Statement: This flaw was found to be a duplicate of CVE-2020-28916. Please see https://access.redhat.com/security/cve/CVE-2020-28916 for information about affected products and security errata.
*** This bug has been marked as a duplicate of bug 1903064 ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1762 https://access.redhat.com/errata/RHSA-2021:1762