Description
A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
Exploits (1)
References (7)
Core 7
Core References
Issue Tracking, Third Party Advisory x_refsource_misc
https://gitlab.com/qemu-project/qemu/-/issues/556
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2020298
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2021-3929
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://gitlab.com/qemu-project/qemu/-/issues/782
Patch, Third Party Advisory x_refsource_misc
https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHNN7QJCEQH7AQG5AQP2GEFAQE6K635I/
Vendor Advisory
https://security.netapp.com/advisory/ntap-20250228-0010/
Scores
CVSS v3
8.2
EPSS
0.0488
EPSS Percentile
89.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-416
Status
published
Products (3)
fedoraproject/fedora
35
fedoraproject/fedora
36
qemu/qemu
< 7.0.0
Published
Aug 25, 2022
Tracked Since
Feb 18, 2026