Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-36648

Опубликовано: 22 авг. 2023
Источник: debian

Описание

The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemuunfixedpackage

Примечания

  • https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.html

  • https://patchew.org/QEMU/20220624143912.1234427-1-mcascell@redhat.com/

  • https://lists.nongnu.org/archive/html/qemu-devel/2023-11/msg04872.html

  • https://patchew.org/QEMU/f6282a8b-3106-4bde-af2c-09236ad0f8d7@tls.msk.ru/

  • https://gitlab.com/qemu-project/qemu/-/issues/1851

  • Not a security issue: https://lists.nongnu.org/archive/html/qemu-devel/2023-08/msg04621.html

Связанные уязвимости

CVSS3: 10
ubuntu
почти 2 года назад

The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.

redhat
почти 2 года назад

The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.

CVSS3: 10
nvd
почти 2 года назад

The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.

CVSS3: 10
msrc
около 1 года назад

Описание отсутствует

CVSS3: 10
github
почти 2 года назад

The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS.