{"id":"AZL-10721","summary":"CVE-2021-3929 affecting package qemu for versions less than 6.2.0-13","details":"A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.","modified":"2026-04-01T05:06:20.525925Z","published":"2022-08-25T20:15:09Z","upstream":["CVE-2021-3929"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3929"}],"affected":[{"package":{"name":"qemu","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/qemu"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-13"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-10721.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}