First published: Wed Nov 10 2021(Updated: )
A stack buffer overflow flaw was found in NVME in QEMU. The flaw lies in hw/nvme/ctrl.c:nvme_changed_nslist() where a variable named off (Log Page offset) is controlled by guest which if set to bigger than 4096 could lead to an integer underflow. Another variable buf_len can also be partially controlled by the guest which would lead to a stack buffer overflow. Since this flaw allows an attacker to read out of bounds memory it could lead to disclosure of sensitive information.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=6.1.0 | |
QEMU qemu | =6.2.0-rc0 | |
QEMU qemu | =6.2.0-rc1 | |
QEMU qemu | >=6.0.0<=6.1.0 | |
redhat/qemu-kvm | <6.2.0 | 6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-3947 is medium with a score of 5.5.
QEMU versions up to and including 6.1.0, 6.2.0-rc0, and 6.2.0-rc1 are affected by CVE-2021-3947.
A malicious guest controlling certain input can trigger a stack-buffer-overflow vulnerability in the QEMU NVME component, leading to disclosure of sensitive information.
The CWE ID for CVE-2021-3947 is CWE-125: Out-of-bounds Read.
Update QEMU to a version that includes the fix for CVE-2021-3947 as provided by the vendor or official software repository.