CVE-2021-20221Out-of-bounds Read in Qemu

Severity
6.0MEDIUMNVD
OSV2.3
EPSS
0.0%
top 93.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 13
Latest updateMay 24

Description

An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:HExploitability: 1.5 | Impact: 4.0

Affected Packages6 packages

debiandebian/qemu< qemu 1:5.2+dfsg-4 (bookworm)
Debianqemu/qemu< 1:5.2+dfsg-4+3
Ubuntuqemu/qemu< 1:2.11+dfsg-1ubuntu7.37+1
NVDqemu/qemu4.2.0
CVEListV5qemu/qemuup to, including qemu 4.2.0

Also affects: Debian Linux 10.0, 9.0, Enterprise Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3f6w-864h-4prm: An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 42022-05-24
OSV
qemu vulnerabilities2021-07-15
OSV
CVE-2021-20221: An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 42021-05-13

📋Vendor Advisories

4
Ubuntu
QEMU vulnerabilities2021-07-15
Microsoft
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing a2021-05-11
Red Hat
qemu: out-of-bound heap buffer access via an interrupt ID field2021-02-02
Debian
CVE-2021-20221: qemu - An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt...2021
CVE-2021-20221 — Out-of-bounds Read in Debian Qemu | cvebase