Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-3611

Published: 11 May 2022

A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.

Notes

AuthorNote
mdeslaur
introduced in 5.0.0-rc0 by:
https://git.qemu.org/?p=qemu.git;a=commit;h=a9d8ba2be58e067bdfbff830eb9ff438d8db7f10

Part of the DMA reentrancy issues.
Fixing this requires backporting the 22 DMA changes listed
below.

Priority

Low

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(1:2.11+dfsg-1ubuntu7.36)
focal Not vulnerable
(1:4.2-3ubuntu6.16)
groovy Ignored
(end of life)
hirsute Ignored
(end of life)
impish Ignored
(end of life)
jammy
Released (1:6.2+dfsg-2ubuntu6.16)
kinetic
Released (1:7.0+dfsg-7ubuntu1)
lunar
Released (1:7.0+dfsg-7ubuntu1)
mantic
Released (1:7.0+dfsg-7ubuntu1)
trusty Not vulnerable

upstream Needs triage

xenial Not vulnerable

Patches:
upstream: https://gitlab.com/qemu-project/qemu/-/commit/41d5e8da3d5e0a143a9fb397c9f34707ec544997
upstream: https://gitlab.com/qemu-project/qemu/-/commit/7ccb391ccd594b3f33de8deb293ff8d47bb4e219
upstream: https://gitlab.com/qemu-project/qemu/-/commit/7a36e42d9114474278ce30ba36945cc62292eb60
upstream: https://gitlab.com/qemu-project/qemu/-/commit/4afd0f2f220ec3dc8518b8de0d66cbf8d2fd1be7
upstream: https://gitlab.com/qemu-project/qemu/-/commit/23faf5694ff8054b847e9733297727be4a641132
upstream: https://gitlab.com/qemu-project/qemu/-/commit/ba06fe8add5b788956a7317246c6280dfc157040
upstream: https://gitlab.com/qemu-project/qemu/-/commit/a1d4b0a3051b3079c8db607f519bc0fcb30e17ec
upstream: https://gitlab.com/qemu-project/qemu/-/commit/c0ee1527358474c75067993d1bb233ad3a4ee081
upstream: https://gitlab.com/qemu-project/qemu/-/commit/5e468a36dcdd8fd5eb04282842b72967a29875e4
upstream: https://gitlab.com/qemu-project/qemu/-/commit/e2d784b67dc724a9b0854b49255ba0ee8ca46543
upstream: https://gitlab.com/qemu-project/qemu/-/commit/959384e74e1b508acc3af6e806b3d7b87335fc2a
upstream: https://gitlab.com/qemu-project/qemu/-/commit/392e48af3468d7f8e49db33fdc9e28b5f99276ce
upstream: https://gitlab.com/qemu-project/qemu/-/commit/1e5a3f8b2a976054da96cbbb9de6cbac7c2efb79
upstream: https://gitlab.com/qemu-project/qemu/-/commit/292e13142d277c15bdd68331abc607e46628b7e1
upstream: https://gitlab.com/qemu-project/qemu/-/commit/2280c27afc65bb2af95dd44a88e3b7117bfe240a
upstream: https://gitlab.com/qemu-project/qemu/-/commit/34cdea1db600540a5261dc474e986f28b637c8e6
upstream: https://gitlab.com/qemu-project/qemu/-/commit/24aed6bcb6b6d266149591f955c2460c28759eb4
upstream: https://gitlab.com/qemu-project/qemu/-/commit/cd1db8df7431edd2210ed0123e2e09b9b6d1e621
upstream: https://gitlab.com/qemu-project/qemu/-/commit/a423a1b523296f8798a5851aaaba64dd166c0a74
upstream: https://gitlab.com/qemu-project/qemu/-/commit/398f9a84ac7132e38caf7b066273734b3bf619ff
upstream: https://gitlab.com/qemu-project/qemu/-/commit/6bebb270731758fae3114b7d24c2b12b7c325cc5
upstream: https://gitlab.com/qemu-project/qemu/-/commit/4a63054bce23982b99f4d3c65528e47e614086b2
upstream: https://gitlab.com/qemu-project/qemu/-/commit/be5a8cf347d0c47ee3e933dde075526fd8bd5c40
upstream: https://gitlab.com/qemu-project/qemu/-/commit/79fa99831debc9782087e834382c577215f2f511

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Changed
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H