CVE-2021-20221
Public on
Description
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
Statement
This issue does not affect the versions of the qemu-kvm package as shipped with the Red Hat Enterprise Linux 5 and 6. This issue affects versions of the qemu-kvm-rhev package as shipped with Red Hat Enterprise Linux 7 and qemu-kvm package as shipped with the Red Hat Enterprise Linux 8. Future package updates may address this issue for Red Hat Enterprise Linux 7 and 8.
Additional Information
- Bugzilla 1924601: CVE-2021-20221 qemu: out-of-bound heap buffer access via an interrupt ID field
- CWE-125->CWE-787: Out-of-bounds Read leads to Out-of-bounds Write
- FAQ: Frequently asked questions about CVE-2021-20221
Affected Packages and Issued Red Hat Security Errata
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Common Vulnerability Scoring System (CVSS) Score Details
CVSS v3 Score Breakdown
Red Hat | NVD | |
---|---|---|
CVSS v3 Base Score | 2.5 | |
Attack Vector | Local | |
Attack Complexity | High | |
Privileges Required | High | |
User Interaction | None | |
Scope | Changed | |
Confidentiality | None | |
Integrity Impact | None | |
Availability Impact | Low |
CVSS v3 Vector
Red Hat: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L