CVE-2021-3929
A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
Published
2022-08-25T20:15:09.417
Last Modified
2025-02-28T13:15:25.913
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 8.2 (HIGH)
Weaknesses
-
Type: Secondary
CWE-416
-
Type: Primary
CWE-416
Affected Vendors & Products
References
-
https://access.redhat.com/security/cve/CVE-2021-3929
Third Party Advisory
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=2020298
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385
Patch, Third Party Advisory
([email protected])
-
https://gitlab.com/qemu-project/qemu/-/issues/556
Issue Tracking, Third Party Advisory
([email protected])
-
https://gitlab.com/qemu-project/qemu/-/issues/782
Exploit, Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHNN7QJCEQH7AQG5AQP2GEFAQE6K635I/
([email protected])
-
https://access.redhat.com/security/cve/CVE-2021-3929
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.redhat.com/show_bug.cgi?id=2020298
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://gitlab.com/qemu-project/qemu/-/issues/556
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://gitlab.com/qemu-project/qemu/-/issues/782
Exploit, Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHNN7QJCEQH7AQG5AQP2GEFAQE6K635I/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20250228-0010/
(af854a3a-2127-422b-91ae-364da2661108)