{"id":"CVE-2021-3416","details":"A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.","modified":"2026-05-15T12:03:54.693784074Z","published":"2021-03-18T20:15:13.300Z","related":["ALSA-2021:3061","SUSE-SU-2021:1240-1","SUSE-SU-2021:1241-1","SUSE-SU-2021:1242-1","SUSE-SU-2021:1243-1","SUSE-SU-2021:1244-1","SUSE-SU-2021:1245-1","SUSE-SU-2021:1305-1","SUSE-SU-2021:14772-1","SUSE-SU-2021:14774-1","SUSE-SU-2021:1942-1","openSUSE-SU-2021:0600-1","openSUSE-SU-2021:1942-1","openSUSE-SU-2024:11287-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"9.0"},{"last_affected":"10.0"}],"source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"],"vendor_product":"fedoraproject:fedora","extracted_events":[{"last_affected":"33"}],"source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*","cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*"],"vendor_product":"redhat:enterprise_linux","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"},{"last_affected":"8.0"},{"last_affected":"8.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202208-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210507-0002/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1932827"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2021/02/26/1"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}]}