{"id":"AZL-9121","summary":"CVE-2021-3748 affecting package qemu for versions less than 6.2.0-2","details":"A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.","modified":"2026-04-01T05:14:39.202261Z","published":"2022-03-23T20:15:09Z","upstream":["CVE-2021-3748"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3748"}],"affected":[{"package":{"name":"qemu","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/qemu"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-2"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-9121.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}