Bug 1973784 (CVE-2021-3611) - CVE-2021-3611 QEMU: intel-hda: segmentation fault due to stack overflow
Summary: CVE-2021-3611 QEMU: intel-hda: segmentation fault due to stack overflow
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-3611
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1974845 1974846 1974847 1975833
Blocks: 1971023 1973792
TreeView+ depends on / blocked
 
Reported: 2021-06-18 17:11 UTC by Mauro Matteo Cascella
Modified: 2022-12-04 22:41 UTC (History)
24 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
Clone Of:
Environment:
Last Closed: 2022-12-04 22:41:08 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:7967 0 None None None 2022-11-15 09:49:57 UTC

Description Mauro Matteo Cascella 2021-06-18 17:11:44 UTC
A KVM guest can crash qemu-kvm (likely with a stack overflow) when the guest has been started with the intel-hda device. According to the upstream ticket, the crash is due to a stack overflow.

References:
https://bugs.launchpad.net/qemu/+bug/1907497
https://gitlab.com/qemu-project/qemu/-/issues/542

Comment 3 Mauro Matteo Cascella 2021-06-22 17:56:03 UTC
This issue was apparently introduced in QEMU upstream version 5.0.0 with commit a9d8ba2b:

$ git tag --contains a9d8ba2be58e067bdfbff830eb9ff438d8db7f10 | head -1
v5.0.0

Comment 4 Mauro Matteo Cascella 2021-06-24 14:18:13 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1975833]

Comment 6 Mauro Matteo Cascella 2021-06-30 20:36:19 UTC
This bug turned out to be a manifestation of a well-known problem ("DMA reentrancy") whose resolution has yet to be found. QEMU upstream is aware of this issue. For additional details, see:

* https://patchew.org/QEMU/20200903110831.353476-1-philmd@redhat.com
* https://mail.gnu.org/archive/html/qemu-devel/2020-09/msg00906.html

Comment 11 errata-xmlrpc 2022-11-15 09:49:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:7967 https://access.redhat.com/errata/RHSA-2022:7967

Comment 12 Product Security DevOps Team 2022-12-04 22:41:05 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3611


Note You need to log in before you can comment on or make changes to this bug.