CVE Vulnerabilities

CVE-2021-3416

Loop with Unreachable Exit Condition ('Infinite Loop')

Published: Mar 18, 2021 | Modified: Nov 21, 2024
CVSS 3.x
6
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
3.2 LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.

Weakness

The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

Affected Software

NameVendorStart VersionEnd Version
QemuQemu*5.2.0 (including)
Advanced Virtualization for RHEL 8.4.0.ZRedHatvirt:av-8040020210922084349.522a0ee4*
Advanced Virtualization for RHEL 8.4.0.ZRedHatvirt-devel:av-8040020210922084349.522a0ee4*
Red Hat Enterprise Linux 8RedHatvirt-devel:rhel-8040020210721215855.522a0ee4*
Red Hat Enterprise Linux 8RedHatvirt:rhel-8040020210721215855.522a0ee4*
QemuUbuntubionic*
QemuUbuntuesm-infra-legacy/trusty*
QemuUbuntuesm-infra/bionic*
QemuUbuntuesm-infra/focal*
QemuUbuntuesm-infra/xenial*
QemuUbuntufocal*
QemuUbuntugroovy*
QemuUbuntutrusty*
QemuUbuntutrusty/esm*
QemuUbuntuxenial*
Qemu-kvmUbuntuprecise/esm*

References