CVE-2021-3748 — Use After Free in Qemu
Severity
7.5HIGHNVD
EPSS
0.0%
top 89.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMar 24
Description
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 0.8 | Impact: 6.0
Affected Packages3 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 34, Ubuntu Linux 18.04, 20.04, 21.10, Enterprise Linux 8.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-4f87-mww8-gm8x: A use-after-free vulnerability was found in the virtio-net device of QEMU↗2022-03-24
OSV
▶
CVEList
▶
📋Vendor Advisories
6Microsoft▶
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region due to num_buffers being set after the v↗2022-03-08
Microsoft▶
A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748 which forgot to unmap the cached virtqueue elements on error leading to memory ↗2022-03-08