CVE-2021-3416 - log back

CVE-2021-3416 edited at 29 Apr 2021 22:51:49
References
https://bugzilla.redhat.com/show_bug.cgi?id=1932827
- https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07431.html
- https://access.redhat.com/security/cve/CVE-2021-3416
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=05df5466c98f3efdd2b68d3b31dad86858acad7
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=1caff0340f49c93d535c6558a5138d20d475315c
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=331d2ac9ea307c990dc86e6493e8f0c48d14bb33
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=26194a58f4eb83c5bdf4061a1628508084450ba1
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=8c92060d3c0248bd4d515719a35922cd2391b9b4
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=8c552542b81e56ff532dd27ec6e5328954bdda73
CVE-2021-3416 edited at 28 Feb 2021 07:59:08
References
https://bugzilla.redhat.com/show_bug.cgi?id=1932827
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07431.html
+ https://access.redhat.com/security/cve/CVE-2021-3416
CVE-2021-3416 edited at 25 Feb 2021 17:30:24
Severity
- Unknown
+ Low
Remote
- Unknown
+ Local
Type
- Unknown
+ Denial of service
Description
+ A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in a denial of service (DoS) scenario.
References
+ https://bugzilla.redhat.com/show_bug.cgi?id=1932827
+ https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07431.html
CVE-2021-3416 created at 25 Feb 2021 17:29:11
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes