An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2021/02/25/2 | mailing list third party advisory patch |
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07428.html | mailing list patch vendor advisory |
https://github.com/qemu/qemu/commit/3de46e6fc489c52c9431a8a832ad8170a7569bd8 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1930087 | issue tracking third party advisory patch |
https://security.netapp.com/advisory/ntap-20220425-0003/ | third party advisory |
https://security.gentoo.org/glsa/202208-27 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html | third party advisory mailing list |