summary refs log tree commit diff stats
path: root/results/classifier/105/device/782
diff options
context:
space:
mode:
Diffstat (limited to 'results/classifier/105/device/782')
-rw-r--r--results/classifier/105/device/78218
1 files changed, 18 insertions, 0 deletions
diff --git a/results/classifier/105/device/782 b/results/classifier/105/device/782
new file mode 100644
index 00000000..8d07d7db
--- /dev/null
+++ b/results/classifier/105/device/782
@@ -0,0 +1,18 @@
+device: 0.858
+vnc: 0.750
+instruction: 0.693
+network: 0.682
+graphic: 0.585
+semantic: 0.454
+other: 0.374
+socket: 0.328
+boot: 0.304
+mistranslation: 0.213
+KVM: 0.076
+assembly: 0.051
+
+nvme: DMA reentrancy issue leads to use-after-free (CVE-2021-3929)
+Description of problem:
+A DMA reentrancy issue was found in the NVM Express Controller (NVMe) emulation. Functions dma_buf_write() or dma_buf_read() in hw/nvme/ctrl.c:nvme_tx() can be called without checking if the destination region overlaps with device's MMIO. This is similar to CVE-2021-3750 (https://gitlab.com/qemu-project/qemu/-/issues/541) and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
+
+This issue was reported by Qiuhao Li.