vulnerability
Red Hat: CVE-2021-3611: CVE-2021-3611 QEMU: intel-hda: segmentation fault due to stack overflow (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | 2022-05-11 | 2022-11-16 | 2025-03-17 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
2022-05-11
Added
2022-11-16
Modified
2025-03-17
Description
A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
Solution(s)
redhat-upgrade-qemu-guest-agentredhat-upgrade-qemu-guest-agent-debuginforedhat-upgrade-qemu-imgredhat-upgrade-qemu-img-debuginforedhat-upgrade-qemu-kvmredhat-upgrade-qemu-kvm-audio-paredhat-upgrade-qemu-kvm-audio-pa-debuginforedhat-upgrade-qemu-kvm-block-curlredhat-upgrade-qemu-kvm-block-curl-debuginforedhat-upgrade-qemu-kvm-block-rbdredhat-upgrade-qemu-kvm-block-rbd-debuginforedhat-upgrade-qemu-kvm-commonredhat-upgrade-qemu-kvm-common-debuginforedhat-upgrade-qemu-kvm-coreredhat-upgrade-qemu-kvm-core-debuginforedhat-upgrade-qemu-kvm-debuginforedhat-upgrade-qemu-kvm-debugsourceredhat-upgrade-qemu-kvm-device-display-virtio-gpuredhat-upgrade-qemu-kvm-device-display-virtio-gpu-ccwredhat-upgrade-qemu-kvm-device-display-virtio-gpu-ccw-debuginforedhat-upgrade-qemu-kvm-device-display-virtio-gpu-debuginforedhat-upgrade-qemu-kvm-device-display-virtio-gpu-glredhat-upgrade-qemu-kvm-device-display-virtio-gpu-gl-debuginforedhat-upgrade-qemu-kvm-device-display-virtio-gpu-pciredhat-upgrade-qemu-kvm-device-display-virtio-gpu-pci-debuginforedhat-upgrade-qemu-kvm-device-display-virtio-gpu-pci-glredhat-upgrade-qemu-kvm-device-display-virtio-gpu-pci-gl-debuginforedhat-upgrade-qemu-kvm-device-display-virtio-vgaredhat-upgrade-qemu-kvm-device-display-virtio-vga-debuginforedhat-upgrade-qemu-kvm-device-display-virtio-vga-glredhat-upgrade-qemu-kvm-device-display-virtio-vga-gl-debuginforedhat-upgrade-qemu-kvm-device-usb-hostredhat-upgrade-qemu-kvm-device-usb-host-debuginforedhat-upgrade-qemu-kvm-device-usb-redirectredhat-upgrade-qemu-kvm-device-usb-redirect-debuginforedhat-upgrade-qemu-kvm-docsredhat-upgrade-qemu-kvm-tests-debuginforedhat-upgrade-qemu-kvm-toolsredhat-upgrade-qemu-kvm-tools-debuginforedhat-upgrade-qemu-kvm-ui-egl-headlessredhat-upgrade-qemu-kvm-ui-egl-headless-debuginforedhat-upgrade-qemu-kvm-ui-openglredhat-upgrade-qemu-kvm-ui-opengl-debuginforedhat-upgrade-qemu-pr-helperredhat-upgrade-qemu-pr-helper-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.