CVE-2021-3611

A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*

History

21 Nov 2024, 06:21

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1973784 - Issue Tracking, Mitigation, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1973784 - Issue Tracking, Mitigation, Third Party Advisory
References () https://gitlab.com/qemu-project/qemu/-/issues/542 - Exploit, Third Party Advisory () https://gitlab.com/qemu-project/qemu/-/issues/542 - Exploit, Third Party Advisory
References () https://security.gentoo.org/glsa/202208-27 - Third Party Advisory () https://security.gentoo.org/glsa/202208-27 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20220624-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220624-0001/ - Third Party Advisory

26 Oct 2022, 13:58

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202208-27 - (GENTOO) https://security.gentoo.org/glsa/202208-27 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220624-0001/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220624-0001/ - Third Party Advisory

15 Aug 2022, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-27 -

24 Jun 2022, 16:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220624-0001/ -

19 May 2022, 16:14

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 6.5
CPE cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1973784 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1973784 - Issue Tracking, Mitigation, Third Party Advisory
References (MISC) https://gitlab.com/qemu-project/qemu/-/issues/542 - (MISC) https://gitlab.com/qemu-project/qemu/-/issues/542 - Exploit, Third Party Advisory

13 May 2022, 15:15

Type Values Removed Values Added
References
  • (MISC) https://gitlab.com/qemu-project/qemu/-/issues/542 -

11 May 2022, 17:20

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-11 16:15

Updated : 2024-11-21 06:21


NVD link : CVE-2021-3611

Mitre link : CVE-2021-3611

CVE.ORG link : CVE-2021-3611


JSON object : View

Products Affected

qemu

  • qemu

redhat

  • enterprise_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write