[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-3929Date: (C)2022-07-08   (M)2024-04-26


A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.2CVSS Score :
Exploit Score: 1.5Exploit Score:
Impact Score: 6.0Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: HIGHAuthentication:
User Interaction: NONEConfidentiality:
Scope: CHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
FEDORA-2022-f0a2695054
https://access.redhat.com/security/cve/CVE-2021-3929
https://bugzilla.redhat.com/show_bug.cgi?id=2020298
https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385
https://gitlab.com/qemu-project/qemu/-/issues/556
https://gitlab.com/qemu-project/qemu/-/issues/782

CPE    1
cpe:/a:qemu:qemu
CWE    1
CWE-416
OVAL    9
oval:org.secpod.oval:def:88465
oval:org.secpod.oval:def:707158
oval:org.secpod.oval:def:89048604
oval:org.secpod.oval:def:89048930
...

© SecPod Technologies