CVE-2021-20203

NameCVE-2021-20203
DescriptionAn integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2623-1
NVD severitylow
Debian Bugs984452

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)stretch1:2.8+dfsg-6+deb9u9vulnerable
stretch (security)1:2.8+dfsg-6+deb9u16fixed
buster, buster (security)1:3.1+dfsg-8+deb10u8vulnerable
bullseye1:5.2+dfsg-11vulnerable
bookworm, sid1:6.1+dfsg-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusourcestretch1:2.8+dfsg-6+deb9u14DLA-2623-1
qemusource(unstable)(unfixed)984452

Notes

[bullseye] - qemu <postponed> (Minor issue)
[buster] - qemu <postponed> (Minor issue)
https://bugs.launchpad.net/qemu/+bug/1913873
https://gitlab.com/qemu-project/qemu/-/issues/308
https://bugs.launchpad.net/qemu/+bug/1890152
https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg07935.html

Search for package or bug name: Reporting problems