Description
A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
References (5)
Core 5
Core References
Exploit, Third Party Advisory x_refsource_misc
https://gitlab.com/qemu-project/qemu/-/issues/770
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2035002
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2021-4158
Patch, Third Party Advisory x_refsource_misc
https://www.mail-archive.com/qemu-devel%40nongnu.org/msg857944.html
Patch, Third Party Advisory x_refsource_misc
https://gitlab.com/qemu-project/qemu/-/commit/9bd6565ccee68f72d5012e24646e12a1c662827e
Scores
CVSS v3
6.0
EPSS
0.0002
EPSS Percentile
6.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Details
CWE
CWE-476
Status
published
Products (2)
qemu/qemu
6.0.0 - 7.0.0
redhat/enterprise_linux
9.0
Published
Aug 24, 2022
Tracked Since
Feb 18, 2026