CVE-2021-3929

HIGH

Qemu < 7.0.0 - Use After Free

Title source: rule
STIX 2.1

Description

A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.

Exploits (1)

nomisec WORKING POC 171 stars
by QiuhaoLi · poc
https://github.com/QiuhaoLi/CVE-2021-3929-3947

References (7)

Core 7
Core References
Issue Tracking, Third Party Advisory x_refsource_misc
https://gitlab.com/qemu-project/qemu/-/issues/556
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2020298
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2021-3929
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://gitlab.com/qemu-project/qemu/-/issues/782

Scores

CVSS v3 8.2
EPSS 0.0488
EPSS Percentile 89.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-416
Status published
Products (3)
fedoraproject/fedora 35
fedoraproject/fedora 36
qemu/qemu < 7.0.0
Published Aug 25, 2022
Tracked Since Feb 18, 2026