First published: Fri Feb 19 2021(Updated: )
A stack overflow via infinite recursion issue was found in the eepro100 i8255x device emulator of QEMU. It could occur while processing controller commands due to DMA re-entrancy issue. A guest user/process may use this flaw to consume cpu cycles or crash the QEMU process on the host resulting in DoS scenario. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html">https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1930646 is classified as a critical vulnerability due to its potential to crash the QEMU process.
To fix REDHAT-BUG-1930646, apply the latest patches or updates provided by QEMU that address this stack overflow issue.
REDHAT-BUG-1930646 is caused by a stack overflow resulting from infinite recursion in the eepro100 i8255x device emulator.
Users running QEMU with the eepro100 i8255x device emulator are affected by REDHAT-BUG-1930646.
Yes, REDHAT-BUG-1930646 can lead to security risks such as CPU resource exhaustion and potential denial of service.