CVE-2021-20221

An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 1%
VendorProductVersion
qemuqemu
𝑥
≤ 4.2.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
noble
Fixed 1:5.2+dfsg-6ubuntu2
released
mantic
Fixed 1:5.2+dfsg-6ubuntu2
released
lunar
Fixed 1:5.2+dfsg-6ubuntu2
released
kinetic
Fixed 1:5.2+dfsg-6ubuntu2
released
jammy
Fixed 1:5.2+dfsg-6ubuntu2
released
impish
Fixed 1:5.2+dfsg-6ubuntu2
released
hirsute
Fixed 1:5.2+dfsg-6ubuntu2
released
groovy
Fixed 1:5.0-5ubuntu9.9
released
focal
Fixed 1:4.2-3ubuntu6.17
released
bionic
Fixed 1:2.11+dfsg-1ubuntu7.37
released
xenial
needed
trusty
needed
qemu-kvm
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
bionic
dne
xenial
dne
trusty
dne