CVE-2021-20203

EUVD-2021-7647
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.2 LOW
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 8%
Affected Products (NVD)
VendorProductVersion
qemuqemu
𝑥
≤ 5.2.0
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bookworm
1:7.2+dfsg-7+deb12u7
fixed
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
vulnerable
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
bionic
Fixed 1:2.11+dfsg-1ubuntu7.39
released
focal
Fixed 1:4.2-3ubuntu6.21
released
groovy
ignored
hirsute
ignored
impish
Fixed 1:6.0+dfsg-2expubuntu1.2
released
jammy
Fixed 1:6.2+dfsg-2ubuntu5
released
kinetic
Fixed 1:6.2+dfsg-2ubuntu5
released
lunar
Fixed 1:6.2+dfsg-2ubuntu5
released
mantic
Fixed 1:6.2+dfsg-2ubuntu5
released
noble
Fixed 1:6.2+dfsg-2ubuntu5
released
trusty
needed
xenial
needed