First published: Thu Feb 18 2021(Updated: )
An infinite loop issue was found in the e1000 NIC emulator of the QEMU. It occurs while processing transmit (tx) descriptors in process_tx_desc, if various descriptor fields are initialised with invalid values. A guest may use this flaw to consume cpu cycles on the host resulting in DoS scenario. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg03595.html">https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg03595.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1930087 is classified as a DoS vulnerability due to potential CPU cycle consumption.
To fix REDHAT-BUG-1930087, you should apply the latest patches and updates provided by the QEMU project.
REDHAT-BUG-1930087 affects QEMU versions where the e1000 NIC emulator is used.
The potential impact of REDHAT-BUG-1930087 includes a denial of service (DoS) condition from excessive CPU usage by affected guest systems.
Currently, disabling the use of the e1000 NIC emulator can serve as a temporary workaround for REDHAT-BUG-1930087.