CVE-2021-3929
Ubuntu Security Notice USN-5489-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
Se ha encontrado un problema de reentrada DMA en la emulación del controlador NVM Express (NVME) en QEMU. Este CVE es similar al CVE-2021-3750 y, al igual que éste, cuando la escritura de reentrada desencadena la función de reinicio nvme_ctrl_reset(), los structs de datos serán liberados conllevando a un problema de uso de memoria previamente liberada. Un huésped malicioso podría usar este fallo para bloquear el proceso QEMU en el host, resultando en una condición de denegación de servicio o, potencialmente, una ejecución de código arbitrario dentro del contexto del proceso QEMU en el host.
This update for qemu fixes the following issues. Fixed a memory leak due to a missing virtqueue detach on error. Fixed an use-after-free in nvme DMA reentrancy issue. Fixed a stack overflow due to a DMA reentrancy issue. Fixed a DoS due to an OOB access during mmio operations. Fixed a remote unauthenticated DoS due to an improper I/O watch removal in VNC TLS handshake. Fixed a heap buffer overflow in virtio_crypto_sym_op_helper. Fixed an out-of-bounds write due to an inconsistent check in ati_2d_blt. Fixed an use-after-free in DMA reentrancy issue. Fixed improper access control on special files in 9pfs. Fixed use-after-free issue in pvrdma_exec_cmd. The following non-security bug was fixed. Prepare for binutils update to 2.41 update.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-05 CVE Reserved
- 2022-05-13 First Exploit
- 2022-06-21 CVE Published
- 2025-02-28 CVE Updated
- 2025-06-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-416: Use After Free
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-3929 | Third Party Advisory | |
https://gitlab.com/qemu-project/qemu/-/issues/556 | Issue Tracking |
URL | Date | SRC |
---|---|---|
https://github.com/QiuhaoLi/CVE-2021-3929-3947 | 2022-05-13 | |
https://gitlab.com/qemu-project/qemu/-/issues/782 | 2025-02-28 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2020298 | 2023-11-07 | |
https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | < 7.0.0 Search vendor "Qemu" for product "Qemu" and version " < 7.0.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 36 Search vendor "Fedoraproject" for product "Fedora" and version "36" | - |
Affected
|