Use After Free
CVE-2021-3748
Summary
A use-after-free vulnerability was found in the virtio-net device of QEMU before 6.1.1. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
- HIGH
- LOCAL
- HIGH
- CHANGED
- NONE
- HIGH
- HIGH
- HIGH
CWE-416 - Use After Free
Use-after-free (UaF) vulnerability occurs when the application is using a pointer to memory that has been freed. Any attempt to read/write to a buffer after it is de-allocated allows memory corruption, sensitive information exposure, and can potentially lead to arbitrary code execution.
Advisory Timeline
- Published