Vulnerability Details : CVE-2021-4158
A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2021-4158
Probability of exploitation activity in the next 30 days: 0.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 31 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-4158
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
1.5
|
4.0
|
NIST |
CWE ids for CVE-2021-4158
-
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2021-4158
-
https://www.mail-archive.com/qemu-devel%40nongnu.org/msg857944.html
[PATCH] acpi: validate hotplug selector on accessPatch;Third Party Advisory
-
https://gitlab.com/qemu-project/qemu/-/issues/770
READ memory access in /hw/acpi/pcihp.c (#770) · Issues · QEMU / QEMU · GitLabExploit;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2035002
2035002 – (CVE-2021-4158) CVE-2021-4158 QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.cIssue Tracking;Patch;Third Party Advisory
-
https://gitlab.com/qemu-project/qemu/-/commit/9bd6565ccee68f72d5012e24646e12a1c662827e
acpi: validate hotplug selector on access (9bd6565c) · Commits · QEMU / QEMU · GitLabPatch;Third Party Advisory
-
https://access.redhat.com/security/cve/CVE-2021-4158
CVE-2021-4158- Red Hat Customer PortalThird Party Advisory
Products affected by CVE-2021-4158
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*