CVE-2021-20257

Source
https://cve.org/CVERecord?id=CVE-2021-20257
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20257.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-20257
Downstream
Related
Published
2022-03-16T15:15:09.983Z
Modified
2026-05-15T12:03:46.114329101Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in processtxdesc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "vendor_product": "debian:debian_linux",
            "extracted_events": [
                {
                    "last_affected": "10.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "fedoraproject:fedora",
            "extracted_events": [
                {
                    "last_affected": "33"
                }
            ],
            "cpes": [
                "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "redhat:enterprise_linux",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                },
                {
                    "last_affected": "8.0"
                },
                {
                    "last_affected": "8.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*"
            ]
        },
        {
            "vendor_product": "redhat:enterprise_linux_for_ibm_z_systems",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"
            ]
        },
        {
            "vendor_product": "redhat:enterprise_linux_for_power_little_endian",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "redhat:openstack_platform",
            "extracted_events": [
                {
                    "last_affected": "10.0"
                },
                {
                    "last_affected": "13.0"
                }
            ],
            "cpes": [
                "cpe:2.3:a:redhat:openstack_platform:10.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*"
            ]
        }
    ]
}
References

Affected packages