2020-12-17 19:02:25 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2021-20257" ,
2022-03-16 15:02:12 +00:00
"ASSIGNER" : "secalert@redhat.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "n/a" ,
"product" : {
"product_data" : [
{
"product_name" : "QEMU" ,
"version" : {
"version_data" : [
{
"version_value" : "Fixed-In v6.2.0"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-835"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://www.openwall.com/lists/oss-security/2021/02/25/2" ,
"url" : "https://www.openwall.com/lists/oss-security/2021/02/25/2"
} ,
{
"refsource" : "MISC" ,
"name" : "https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07428.html" ,
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07428.html"
} ,
{
"refsource" : "MISC" ,
"name" : "https://github.com/qemu/qemu/commit/3de46e6fc489c52c9431a8a832ad8170a7569bd8" ,
"url" : "https://github.com/qemu/qemu/commit/3de46e6fc489c52c9431a8a832ad8170a7569bd8"
} ,
{
"refsource" : "MISC" ,
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1930087" ,
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1930087"
2022-04-25 21:01:25 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://security.netapp.com/advisory/ntap-20220425-0003/" ,
"url" : "https://security.netapp.com/advisory/ntap-20220425-0003/"
2022-08-14 19:00:35 +00:00
} ,
{
"refsource" : "GENTOO" ,
"name" : "GLSA-202208-27" ,
"url" : "https://security.gentoo.org/glsa/202208-27"
2022-09-05 06:00:34 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html"
2022-03-16 15:02:12 +00:00
}
]
2020-12-17 19:02:25 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2022-03-16 15:02:12 +00:00
"value" : "An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability."
2020-12-17 19:02:25 +00:00
}
]
}
}