UBUNTU-CVE-2021-3947

Source
https://ubuntu.com/security/CVE-2021-3947
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-3947.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-3947
Upstream
Published
2022-02-18T18:15:00Z
Modified
2025-09-08T16:46:50Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvmechangednslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.

References

Affected packages

Ubuntu:22.04:LTS / qemu

Package

Name
qemu
Purl
pkg:deb/ubuntu/qemu@1:6.2+dfsg-2ubuntu5?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:6.2+dfsg-2ubuntu5

Affected versions

1:6.*
1:6.0+dfsg-2expubuntu1
1:6.0+dfsg-2expubuntu2
1:6.0+dfsg-2expubuntu4

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-block-extra"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-guest-agent"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-arm"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-common"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-data"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-gui"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-mips"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-misc"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-ppc"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-s390x"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-sparc"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-x86"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-x86-microvm"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-system-x86-xen"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-user"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-user-binfmt"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-user-static"
        },
        {
            "binary_version": "1:6.2+dfsg-2ubuntu5",
            "binary_name": "qemu-utils"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-3947.json"