First published: Fri Jun 18 2021(Updated: )
A KVM guest can crash qemu-kvm (likely with a stack overflow) when the guest has been started with the intel-hda device. According to the upstream ticket, the crash is due to a stack overflow. References: <a href="https://bugs.launchpad.net/qemu/+bug/1907497">https://bugs.launchpad.net/qemu/+bug/1907497</a> <a href="https://gitlab.com/qemu-project/qemu/-/issues/542">https://gitlab.com/qemu-project/qemu/-/issues/542</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <7.0.0 | |
Redhat Enterprise Linux | =8.0 | |
debian/qemu | <=1:5.2+dfsg-11+deb11u3<=1:5.2+dfsg-11+deb11u2 | 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3611 is a stack overflow vulnerability found in the Intel HD Audio device (intel-hda) of QEMU.
The vulnerability allows a malicious guest to crash the QEMU process on the host, resulting in a denial of service.
CVE-2021-3611 has a severity rating of 6.5, which is considered medium.
QEMU versions up to exclusive 7.0.0 and Redhat Enterprise Linux version 8.0 are affected.
Update QEMU to a version higher than 7.0.0 or apply the necessary patches provided by the vendor.