First published: Thu Feb 25 2021(Updated: )
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU. The said issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume cpu cycles or crash the QEMU process on the host resulting in DoS scenario. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07431.html">https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07431.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1932827 is critical due to its potential to cause CPU exhaustion and crashes.
To fix REDHAT-BUG-1932827, you should update to the latest version of QEMU that addresses this vulnerability.
The impacts of REDHAT-BUG-1932827 include excessive CPU consumption and possible crashes of the QEMU process.
Users and systems running the affected versions of QEMU in loopback mode are at risk from REDHAT-BUG-1932827.
REDHAT-BUG-1932827 was reported in February 2021.