CVE Vulnerabilities

CVE-2021-3682

Release of Invalid Pointer or Reference

Published: Aug 05, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
6 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM

A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.

Weakness

The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.

Affected Software

Name Vendor Start Version End Version
Qemu Qemu * 6.1.0 (excluding)
Qemu Qemu 6.1.0-rc1 (including) 6.1.0-rc1 (including)
Advanced Virtualization for RHEL 8.2.1 RedHat virt:8.2-8020120210917153657.863bb0db *
Advanced Virtualization for RHEL 8.2.1 RedHat virt-devel:8.2-8020120210917153657.863bb0db *
Advanced Virtualization for RHEL 8.4.0.Z RedHat virt:av-8040020210922084349.522a0ee4 *
Advanced Virtualization for RHEL 8.4.0.Z RedHat virt-devel:av-8040020210922084349.522a0ee4 *
Qemu Ubuntu bionic *
Qemu Ubuntu devel *
Qemu Ubuntu esm-infra/xenial *
Qemu Ubuntu focal *
Qemu Ubuntu hirsute *
Qemu Ubuntu impish *
Qemu Ubuntu jammy *
Qemu Ubuntu kinetic *
Qemu Ubuntu trusty *
Qemu Ubuntu trusty/esm *
Qemu Ubuntu xenial *

Extended Description

This weakness can take several forms, such as:

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, glibc in Linux provides protection against free of invalid pointers.

References