First published: Sun Dec 12 2021(Updated: )
A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <17:7.0.0-13.el9 | 17:7.0.0-13.el9 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | >=6.0.0<7.0.0 | |
Red Hat Enterprise Linux | =9.0 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-4158.
The severity of CVE-2021-4158 is medium.
The affected software for CVE-2021-4158 includes Red Hat Enterprise Linux 9.0, qemu-kvm 17:7.0.0-13.el9, Ubuntu qemu 1:6.2+dfsg-2ubuntu5, and Ubuntu qemu 1:6.0+dfsg-2.
A malicious, privileged user within the guest can exploit CVE-2021-4158 to crash the QEMU process on the host, resulting in a denial of service condition.
Yes, there are remedies available for CVE-2021-4158. Please refer to the official documentation and updates provided by your software vendor for the specific package versions mentioned.