CVE-2021-20221 log

Source
Severity Low
Remote No
Type Arbitrary code execution
Description
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in a denial of service scenario. Exploiting this issue requires an unusual kernel start-up with 'kernel-irqchip=off'.
Group Package Affected Fixed Severity Status Ticket
AVG-1308 qemu 5.2.0-3 Medium Vulnerable
References
https://www.openwall.com/lists/oss-security/2021/02/05/1
https://bugs.launchpad.net/qemu/+bug/1914353
https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a
Notes
Workaround
==========

The issue can be mitigated by using kernel-irqchip=on, which constitutes the recommended default setting of this option.