CVE-2021-3416 — Infinite Loop in Qemu
Severity
6.0MEDIUMNVD
OSV2.3
EPSS
0.0%
top 99.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 18
Latest updateMay 24
Description
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:HExploitability: 1.5 | Impact: 4.0
Affected Packages9 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 33, Enterprise Linux 6.0, 7.0, 8.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-g3hx-jv57-3ffr: A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5↗2022-05-24
OSV▶
CVE-2021-3416: A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5↗2021-03-18
📋Vendor Advisories
4Microsoft▶
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA ch↗2021-03-09
Debian▶
CVE-2021-3416: qemu - A potential stack overflow via infinite loop issue was found in various NIC emul...↗2021