CVE Vulnerabilities

CVE-2021-3682

Release of Invalid Pointer or Reference

Published: Aug 05, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
6 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.

Weakness

The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.

Affected Software

NameVendorStart VersionEnd Version
QemuQemu*6.1.0 (excluding)
QemuQemu6.1.0-rc1 (including)6.1.0-rc1 (including)
Advanced Virtualization for RHEL 8.2.1RedHatvirt:8.2-8020120210917153657.863bb0db*
Advanced Virtualization for RHEL 8.2.1RedHatvirt-devel:8.2-8020120210917153657.863bb0db*
Advanced Virtualization for RHEL 8.4.0.ZRedHatvirt:av-8040020210922084349.522a0ee4*
Advanced Virtualization for RHEL 8.4.0.ZRedHatvirt-devel:av-8040020210922084349.522a0ee4*
QemuUbuntubionic*
QemuUbuntudevel*
QemuUbuntuesm-infra-legacy/trusty*
QemuUbuntuesm-infra/bionic*
QemuUbuntuesm-infra/focal*
QemuUbuntuesm-infra/xenial*
QemuUbuntufocal*
QemuUbuntuhirsute*
QemuUbuntuimpish*
QemuUbuntujammy*
QemuUbuntukinetic*
QemuUbuntutrusty*
QemuUbuntutrusty/esm*
QemuUbuntuxenial*

Extended Description

This weakness can take several forms, such as:

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, glibc in Linux provides protection against free of invalid pointers.

References