Description
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
Published: 2022-01-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-34014 A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00038}

epss

{'score': 0.0004}


Subscriptions

Qemu Qemu
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:16:04.234Z

Reserved: 2021-12-21T00:00:00.000Z

Link: CVE-2021-4145

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-25T20:15:08.657

Modified: 2024-11-21T06:36:59.903

Link: CVE-2021-4145

cve-icon Redhat

Severity : Low

Publid Date: 2021-12-10T00:00:00Z

Links: CVE-2021-4145 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses