CVE-2021-20221
Summary
| CVE | CVE-2021-20221 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-13 16:15:00 UTC |
| Updated | 2023-11-07 03:29:00 UTC |
| Description | An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1924601 – (CVE-2021-20221) CVE-2021-20221 qemu: out-of-bound heap buffer access via an interrupt ID field |
MISC |
bugzilla.redhat.com |
|
| oss-security - CVE-2021-20221 QEMU: aarch64: GIC: out-of-bound heap buffer access
via an interrupt ID field |
MISC |
www.openwall.com |
|
| CVE-2021-20221 QEMU Vulnerability in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| Bug #1914353 “QEMU: aarch64: :GIC: out-of-bounds access via inte...” : Bugs : QEMU |
MISC |
bugs.launchpad.net |
|
| [SECURITY] [DLA 3099-1] qemu security update |
MLIST |
lists.debian.org |
|
| [SECURITY] [DLA 2560-1] qemu security update |
MLIST |
lists.debian.org |
|
| oss-security - CVE-2021-20221 QEMU: aarch64: GIC: out-of-bound heap buffer access
via an interrupt ID field |
MLIST |
www.openwall.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159250 Oracle Enterprise Linux Security Update for qemu (ELSA-2021-9285)
- 159343 Oracle Enterprise Linux Security Update for virt:ol and virt-devel:rhel (ELSA-2021-3061)
- 159566 Oracle Enterprise Linux Security Update for kvm_utils (ELSA-2021-9568)
- 174921 SUSE Enterprise Linux Security Update for qemu (SUSE-SU-2021:1245-1)
- 174923 SUSE Enterprise Linux Security Update for qemu (SUSE-SU-2021:1241-1)
- 174924 SUSE Enterprise Linux Security Update for qemu (SUSE-SU-2021:1244-1)
- 174926 SUSE Enterprise Linux Security Update for qemu (SUSE-SU-2021:1242-1)
- 180227 Debian Security Update for qemu (CVE-2021-20221)
- 180995 Debian Security Update for qemu (DLA 3099-1)
- 198432 Ubuntu Security Notification for QEMU vulnerabilities (USN-5010-1)
- 239539 Red Hat Update for virt:rhel and virt-devel:rhel (RHSA-2021:3061)
- 377346 Alibaba Cloud Linux Security Update for virt:rhel and virt-devel:rhel (ALINUX3-SA-2021:0058)
- 502351 Alpine Linux Security Update for qemu
- 671198 EulerOS Security Update for qemu (EulerOS-SA-2022-1034)
- 671203 EulerOS Security Update for qemu (EulerOS-SA-2022-1014)
- 750124 SUSE Enterprise Linux Security Update for qemu (SUSE-SU-2021:1894-1)
- 750338 OpenSUSE Security Update for qemu (openSUSE-SU-2021:0363-1)
- 900156 CBL-Mariner Linux Security Update for qemu-kvm 4.2.0
- 903375 Common Base Linux Mariner (CBL-Mariner) Security Update for qemu-kvm (4272)
- 940064 AlmaLinux Security Update for virt:rhel and virt-devel:rhel (ALSA-2021:3061)
- 960072 Rocky Linux Security Update for virt:rhel and virt-devel:rhel (RLSA-2021:3061)