CVE-2021-3947

MEDIUM

Qemu < 6.1.0 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.

References (3)

Core 3
Core References
Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2021869
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20220318-0003/
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202208-27

Scores

CVSS v3 5.5
EPSS 0.0006
EPSS Percentile 18.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-125
Status published
Products (2)
qemu/qemu 6.2.0 rc0 (2 CPE variants)
qemu/qemu 6.0.0 - 6.1.0
Published Feb 18, 2022
Tracked Since Feb 18, 2026