Vulnerability Description
A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | 6.1.0 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2021-3735Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1997184Issue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2021-3735Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2021-3735Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1997184Issue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2021-3735Third Party Advisory
- https://security.netapp.com/advisory/ntap-20250228-0009/
FAQ
What is CVE-2021-3735?
CVE-2021-3735 is a vulnerability with a CVSS score of 4.4 (MEDIUM). A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from...
How severe is CVE-2021-3735?
CVE-2021-3735 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3735?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Debian Debian Linux.