{"api_version":"1","generated_at":"2026-04-23T02:59:02+00:00","cve":"CVE-2021-4095","urls":{"html":"https://cve.report/CVE-2021-4095","api":"https://cve.report/api/cve/CVE-2021-4095.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-4095","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-4095"},"summary":{"title":"CVE-2021-4095","description":"A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-03-10 17:44:00","updated_at":"2023-11-07 03:40:00"},"problem_types":["CWE-476"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIOQN7JJNN6ABIDGRSTVZA65MHRLMH2Q/","name":"FEDORA-2022-0816754490","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: kernel-tools-5.17.4-100.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT6573CGKVK3DU2632VVO5BVM4IU7SBV/","name":"FEDORA-2022-8efcea6e67","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: kernel-5.17.4-200.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT6573CGKVK3DU2632VVO5BVM4IU7SBV/","name":"FEDORA-2022-8efcea6e67","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: kernel-5.17.4-200.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031194","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2031194","refsource":"MISC","tags":[],"title":"2031194 – (CVE-2021-4095) CVE-2021-4095 kernel: KVM: NULL pointer dereference in kvm_dirty_ring_get() in virt/kvm/dirty_ring.c","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2022/01/17/1","name":"[oss-security] 20220117 Re: CVE-2021-4095: kernel: KVM: NULL pointer dereference in kvm_dirty_ring_get() in virt/kvm/dirty_ring.c","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2021-4095: kernel: KVM: NULL pointer\n dereference in kvm_dirty_ring_get() in virt/kvm/dirty_ring.c","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIOQN7JJNN6ABIDGRSTVZA65MHRLMH2Q/","name":"FEDORA-2022-0816754490","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: kernel-tools-5.17.4-100.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-4095","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4095","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"4095","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4095","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4095","vulnerable":"1","versionEndIncluding":"5.16","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-4095","qid":"181963","title":"Debian Security Update for linux (CVE-2021-4095)"},{"cve":"CVE-2021-4095","qid":"282604","title":"Fedora Security Update for kernel (FEDORA-2022-8efcea6e67)"},{"cve":"CVE-2021-4095","qid":"282605","title":"Fedora Security Update for kernel (FEDORA-2022-0816754490)"},{"cve":"CVE-2021-4095","qid":"900750","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8944)"},{"cve":"CVE-2021-4095","qid":"900873","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8965)"},{"cve":"CVE-2021-4095","qid":"902111","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8965-1)"},{"cve":"CVE-2021-4095","qid":"905746","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8944-1)"},{"cve":"CVE-2021-4095","qid":"906486","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8965-2)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-4095","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"kernel","version":{"version_data":[{"version_value":"Linux kernel versions prior to 5.17-rc1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-476"}]}]},"references":{"reference_data":[{"refsource":"MLIST","name":"[oss-security] 20220117 Re: CVE-2021-4095: kernel: KVM: NULL pointer dereference in kvm_dirty_ring_get() in virt/kvm/dirty_ring.c","url":"http://www.openwall.com/lists/oss-security/2022/01/17/1"},{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2031194","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031194"},{"refsource":"FEDORA","name":"FEDORA-2022-0816754490","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIOQN7JJNN6ABIDGRSTVZA65MHRLMH2Q/"},{"refsource":"FEDORA","name":"FEDORA-2022-8efcea6e67","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT6573CGKVK3DU2632VVO5BVM4IU7SBV/"}]},"description":{"description_data":[{"lang":"eng","value":"A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1."}]}},"nvd":{"publishedDate":"2022-03-10 17:44:00","lastModifiedDate":"2023-11-07 03:40:00","problem_types":["CWE-476"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:N/I:N/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":1.9},"severity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndIncluding":"5.16","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"4095","Ordinal":"222642","Title":"CVE-2021-4095","CVE":"CVE-2021-4095","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"4095","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}