First published: Wed Feb 03 2021(Updated: )
An out-of-bound heap buffer access via an interrupt ID field resulting from undefined behaviour. The Interrupt ID of the SGI to forward to the specified CPU interfaces. The value of this field is the Interrupt ID, in the range 0-15, for example a value of 0b0011 specifies Interrupt ID 3. It requires unusual kernel start-up with 'kernel-irqchip=off'. This issue does not affect default configuration ie. kernel-irqchip=on. Upstream patch: --------------- -> <a href="https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a">https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=4.2.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20221 is an out-of-bounds heap buffer access vulnerability in the ARM Generic Interrupt Controller emulator of QEMU.
QEMU up to and including version 4.2.0 on the aarch64 platform, Redhat Enterprise Linux 8.0, Debian Debian Linux 9.0 and 10.0.
CVE-2021-20221 has a severity rating of medium (6).
To fix CVE-2021-20221 for QEMU, you should update to version 4.2.1 or later.
You can find more information about CVE-2021-20221 in the referenced links: [Link 1](https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1924602), [Link 3](https://bugs.launchpad.net/qemu/+bug/1914353)