CVE-2021-3947
NixOS vulnerability analysis and mitigation

Overview

A stack-buffer-overflow vulnerability was discovered in QEMU's NVME component, identified as CVE-2021-3947. The vulnerability was found in the nvmechangednslist() function, where a malicious guest controlling certain input can read out-of-bounds memory. The issue was discovered and reported in November 2021 (CVE Details).

Technical details

The vulnerability lies in the NVME component of QEMU, specifically in the hw/nvme/ctrl.c:nvmechangednslist() function. The flaw occurs when a variable named 'off' (Log Page offset), which can be controlled by the guest, is set to a value larger than 4096, potentially leading to an integer underflow. Additionally, another variable 'buflen' can be partially controlled by the guest, which could result in a stack buffer overflow ([Red Hat Bugzilla](https://bugzilla.redhat.com/showbug.cgi?id=2021869)). The vulnerability was introduced in QEMU version 6.0.0-rc0 and was fixed in version 6.2.0-rc3 (Debian Tracker).

Impact

The successful exploitation of this vulnerability could lead to the disclosure of sensitive information through out-of-bounds memory reading. This poses a security risk as it allows attackers to potentially access unauthorized data (NetApp Security).

Mitigation and workarounds

The vulnerability was fixed in QEMU version 6.2.0-rc3 through a patch that was submitted upstream. Users are advised to upgrade to QEMU version 6.2.0-rc3 or later to address this vulnerability (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61619HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61618HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61617HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61610HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61609HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management