First published: Mon Oct 25 2021(Updated: )
A denial of service problem was found in KVM specific to powerpc. In this flaw, a user with local access can confuse the host offline code, causing the guest to crash. References: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
redhat/kernel | <5.15 | 5.15 |
Linux kernel | >=5.2<5.4.15 | |
Fedora | =33 | |
Fedora | =34 | |
Fedora | =35 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43056 has been classified as a denial of service vulnerability which may have a critical impact in certain environments.
To mitigate CVE-2021-43056, update to the recommended kernel versions provided by your Linux distribution.
CVE-2021-43056 affects users of KVM on powerpc architecture, particularly those with local access.
CVE-2021-43056 can cause guest virtual machines to crash, impacting availability.
Kernel versions prior to 0:4.18.0-372.9.1.el8 and various versions of Linux kernel up to 5.4.15 are vulnerable to CVE-2021-43056.