CVE-2021-20203

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.2 LOW
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
VendorProductVersion
qemuqemu
𝑥
≤ 5.2.0
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
vulnerable
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
noble
Fixed 1:6.2+dfsg-2ubuntu5
released
mantic
Fixed 1:6.2+dfsg-2ubuntu5
released
lunar
Fixed 1:6.2+dfsg-2ubuntu5
released
kinetic
Fixed 1:6.2+dfsg-2ubuntu5
released
jammy
Fixed 1:6.2+dfsg-2ubuntu5
released
impish
Fixed 1:6.0+dfsg-2expubuntu1.2
released
hirsute
ignored
groovy
ignored
focal
Fixed 1:4.2-3ubuntu6.21
released
bionic
Fixed 1:2.11+dfsg-1ubuntu7.39
released
xenial
needed
trusty
needed