First published: Mon Nov 30 2020(Updated: )
A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <5.2.0 | |
Debian Debian Linux | =10.0 | |
redhat/qemu | <5.2.0 | 5.2.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27821 is a vulnerability in the memory management API of QEMU that could lead to an out-of-bounds write access and crashing of the QEMU process.
CVE-2020-27821 has a severity score of 5.7, which is considered medium severity.
QEMU version up to exclusive 5.2.0 is affected by CVE-2020-27821.
To mitigate CVE-2020-27821, upgrade QEMU to version 5.2.0 or higher.
You can find more information about CVE-2020-27821 at the following references: [Link 1](https://www.cve.org/CVERecord?id=CVE-2020-27821), [Link 2](https://nvd.nist.gov/vuln/detail/CVE-2020-27821), [Link 3](https://www.openwall.com/lists/oss-security/2020/12/16/6), [Link 4](https://bugzilla.redhat.com/show_bug.cgi?id=1902651), [Link 5](https://access.redhat.com/errata/RHBA-2021:0639)