Description
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2970-1 | qemu security update |
Debian DLA |
DLA-3099-1 | qemu security update |
Debian DSA |
DSA-4980-1 | qemu security update |
EUVD |
EUVD-2021-27024 | A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process. |
Ubuntu USN |
USN-5307-1 | QEMU vulnerabilities |
References
History
No history.
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:09:08.293Z
Reserved: 2021-08-30T00:00:00.000Z
Link: CVE-2021-3748
No data.
Status : Modified
Published: 2022-03-23T20:15:09.893
Modified: 2024-11-21T06:22:19.667
Link: CVE-2021-3748
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN