Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-4144

Опубликовано: 29 нояб. 2022
Источник: debian
EPSS Низкий

Описание

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:7.2+dfsg-1package
qemuignoredbullseyepackage
qemupostponedbusterpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2148506

  • https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html

  • https://gitlab.com/qemu-project/qemu/-/issues/1336

  • Pre-requisite 1: https://gitlab.com/qemu-project/qemu/-/commit/61c34fc194b776ecadc39fb26b061331107e5599 (v7.2.0-rc3)

  • Pre-requisite 2: https://gitlab.com/qemu-project/qemu/-/commit/8efec0ef8bbc1e75a7ebf6e325a35806ece9b39f (v7.2.0-rc3)

  • Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/6dbbf055148c6f1b7d8a3251a65bd6f3d1e1f622 (v7.2.0-rc3)

EPSS

Процентиль: 1%
0.0001
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

CVSS3: 6.5
redhat
больше 2 лет назад

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

CVSS3: 6.5
nvd
больше 2 лет назад

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

CVSS3: 6.5
msrc
11 месяцев назад

Описание отсутствует

suse-cvrf
около 2 лет назад

Security update for qemu

EPSS

Процентиль: 1%
0.0001
Низкий