CVE Vulnerabilities

CVE-2021-4145

NULL Pointer Dereference

Published: Jan 25, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
5.6 LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
Ubuntu
LOW

A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The self pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that its not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

Name Vendor Start Version End Version
Qemu Qemu 6.1.0 (including) 6.1.0 (including)
Qemu Qemu 6.1.0-rc0 (including) 6.1.0-rc0 (including)
Qemu Qemu 6.1.0-rc1 (including) 6.1.0-rc1 (including)
Qemu Qemu 6.1.0-rc2 (including) 6.1.0-rc2 (including)
Qemu Qemu 6.1.0-rc3 (including) 6.1.0-rc3 (including)
Qemu Qemu 6.1.0-rc4 (including) 6.1.0-rc4 (including)
Red Hat Enterprise Linux 8 RedHat virt-devel:rhel-8060020220408104655.d63f516d *
Red Hat Enterprise Linux 8 RedHat virt:rhel-8060020220408104655.d63f516d *
Qemu Ubuntu trusty *

Potential Mitigations

References