Vulnerability Name: | CVE-2021-3929 (CCN-234577) | ||||||||||||||||||||||||||||
Assigned: | 2021-11-05 | ||||||||||||||||||||||||||||
Published: | 2022-03-24 | ||||||||||||||||||||||||||||
Updated: | 2022-10-01 | ||||||||||||||||||||||||||||
Summary: | A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3929 Source: MISC Type: Third Party Advisory https://access.redhat.com/security/cve/CVE-2021-3929 Source: CCN Type: Red Hat Bugzilla - Bug 2020298 (CVE-2021-3929) - CVE-2021-3929 QEMU: nvme: DMA reentrancy issue leads to use-after-free Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2020298 Source: XF Type: UNKNOWN qemu-cve20213929-code-exec(234577) Source: CCN Type: QEMU GIT Repository hw/nvme: fix CVE-2021-3929 Source: MISC Type: Patch, Third Party Advisory https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385 Source: MISC Type: Issue Tracking, Third Party Advisory https://gitlab.com/qemu-project/qemu/-/issues/556 Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://gitlab.com/qemu-project/qemu/-/issues/782 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-f0a2695054 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |