
Cloud Vulnerability DB
A community-led vulnerabilities database
A stack-buffer-overflow vulnerability was discovered in QEMU's NVME component, identified as CVE-2021-3947. The vulnerability was found in the nvmechangednslist() function, where a malicious guest controlling certain input can read out-of-bounds memory. The issue was discovered and reported in November 2021 (CVE Details).
The vulnerability lies in the NVME component of QEMU, specifically in the hw/nvme/ctrl.c:nvmechangednslist() function. The flaw occurs when a variable named 'off' (Log Page offset), which can be controlled by the guest, is set to a value larger than 4096, potentially leading to an integer underflow. Additionally, another variable 'buflen' can be partially controlled by the guest, which could result in a stack buffer overflow ([Red Hat Bugzilla](https://bugzilla.redhat.com/showbug.cgi?id=2021869)). The vulnerability was introduced in QEMU version 6.0.0-rc0 and was fixed in version 6.2.0-rc3 (Debian Tracker).
The successful exploitation of this vulnerability could lead to the disclosure of sensitive information through out-of-bounds memory reading. This poses a security risk as it allows attackers to potentially access unauthorized data (NetApp Security).
The vulnerability was fixed in QEMU version 6.2.0-rc3 through a patch that was submitted upstream. Users are advised to upgrade to QEMU version 6.2.0-rc3 or later to address this vulnerability (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."