CVE-2021-3416

Beschreibung:
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.

CWE: CWE-835

CVSS-Bewertung
CVSS 2: LOW – 2.1 (Version: 2.0)
CVSS 3: MEDIUM – 6 (Version: 3.1)

Links:

NVD – CVE-2021-3416
CVE – CVE-2021-3416

Link (max. 20) Quelle Tags
https://bugzilla.redhat.com/show_bug.cgi?id=1932827 MISC Issue Tracking Patch Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/02/26/1 MISC Mailing List Patch Third Party Advisory
[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update MLIST Third Party Advisory
https://security.netapp.com/advisory/ntap-20210507-0002/ CONFIRM Third Party Advisory
https://security.netapp.com/advisory/ntap-20210326-0006/ CONFIRM Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc MISC Third Party Advisory
[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
GLSA-202103-03 GENTOO Third Party Advisory
https://www.tenable.com/security/tns-2021-06 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-05 CONFIRM Third Party Advisory
FEDORA-2021-cbf14ab8f9 FEDORA Mailing List Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10356 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-09 CONFIRM

Quelle: NVD – CVE-2021-3416
Datum Veröffentlichung: 2021-03-18T20:15Z, Datum letzte Änderung: 2021-05-07T05:15Z