Vulnerability Details : CVE-2021-20221
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2021-20221
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:arm64:*
Exploit prediction scoring system (EPSS) score for CVE-2021-20221
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-20221
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST | |
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
1.5
|
4.0
|
NIST |
CWE ids for CVE-2021-20221
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: secalert@redhat.com (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2021-20221
-
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
[SECURITY] [DLA 3099-1] qemu security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html
[SECURITY] [DLA 2560-1] qemu security updateMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/02/05/1
oss-security - CVE-2021-20221 QEMU: aarch64: GIC: out-of-bound heap buffer access via an interrupt ID fieldMailing List;Patch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20210708-0005/
CVE-2021-20221 QEMU Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1924601
1924601 – (CVE-2021-20221) CVE-2021-20221 qemu: out-of-bound heap buffer access via an interrupt ID fieldIssue Tracking;Patch;Third Party Advisory
Jump to