CVE-2021-20221 log
Source |
|
Severity | Low |
Remote | No |
Type | Arbitrary code execution |
Description | An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in a denial of service scenario. Exploiting this issue requires an unusual kernel start-up with 'kernel-irqchip=off'. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1308 | qemu | 5.2.0-4 | 6.0.0-1 | Medium | Fixed |
References |
---|
https://www.openwall.com/lists/oss-security/2021/02/05/1 https://bugs.launchpad.net/qemu/+bug/1914353 https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a |
Notes |
---|
Workaround ========== The issue can be mitigated by using kernel-irqchip=on, which constitutes the recommended default setting of this option. |