{"id":"CVE-2021-3748","details":"A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.","modified":"2026-05-15T12:04:38.047933650Z","published":"2022-03-23T20:15:09.893Z","related":["ALSA-2022:1759","SUSE-SU-2021:3519-1","SUSE-SU-2021:3604-1","SUSE-SU-2021:3605-1","SUSE-SU-2021:3613-1","SUSE-SU-2021:3614-1","SUSE-SU-2021:3635-1","SUSE-SU-2021:3653-1","openSUSE-SU-2021:1461-1","openSUSE-SU-2021:3604-1","openSUSE-SU-2021:3605-1","openSUSE-SU-2021:3614-1","openSUSE-SU-2024:11597-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"18.04"},{"last_affected":"20.04"},{"last_affected":"21.10"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"9.0"},{"last_affected":"10.0"}],"vendor_product":"debian:debian_linux","cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"34"}],"vendor_product":"fedoraproject:fedora","cpes":["cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.0"}],"vendor_product":"redhat:enterprise_linux","cpes":["cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_advanced_virtualization_eus","extracted_events":[{"last_affected":"8.4"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_advanced_virtualization_eus:8.4:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202208-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220425-0004/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1998514"},{"type":"FIX","url":"https://github.com/qemu/qemu/commit/bedd7e93d01961fcb16a97ae45d93acf357e11f6"},{"type":"FIX","url":"https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg00388.html"},{"type":"FIX","url":"https://ubuntu.com/security/CVE-2021-3748"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}