CVE-2021-20255

Name
CVE-2021-20255
Description
A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1930646
Mailing List https://www.openwall.com/lists/oss-security/2021/02/25/1
Third Party Advisory https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Feepro100_stackoverflow1
MLIST https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html
CONFIRM https://security.netapp.com/advisory/ntap-20210507-0003/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu == None == None

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.13-community 5.2.0-r3 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
qemu 3.10-main 4.0.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
qemu edge-community 6.1.0-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
qemu 3.14-community 6.0.0-r5 Natanael Copa <ncopa@alpinelinux.org> fixed