8.2
CVSSv3

CVE-2021-3929

Published: 25/08/2022 Updated: 07/11/2023
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 0

Vulnerability Summary

It exists that QEMU incorrectly handled QXL display device emulation. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-4206, CVE-2021-4207)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

Several security issues were fixed in QEMU ...
A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue A malicious guest could use this flaw to crash the QEMU process on the ...

Github Repositories

Starred Repositories This is a list of repositories starred by lemon-mint Table of Contents Assembly C C# C++ CMake CSS Clojure Common Lisp Coq Cuda Dart Dockerfile Elixir Elm F* Go HTML Haskell Haxe Java JavaScript Jinja Jsonnet Julia Jupyter Notebook Kotlin Lua MDX Makefile Nim Nix Objective-C PHP Perl PowerShell Python RPM Spec Ragel Reason Ruby Rust SCSS SWIG Sage Scala S

Recursive MMIO VM Escape PoC

CVE-2021-3929-3947 VM escape PoC for CVE-2021-3929 and CVE-2021-3947 Educational purposes only You can read the white paper for more information Environment OS: Ubuntu 2110 Linux: 5130 gcc: 1120 glibc: 234 glib: 2684 QEMU: 610 Guest OS: Ubuntu 2104 Commands Host qemu-system-x86_64 run -machine type=q35,accel=kvm -cpu host \