Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-4172

Опубликовано: 29 нояб. 2022
Источник: debian
EPSS Низкий

Описание

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:7.2+dfsg-1package
qemunot-affectedbullseyepackage
qemunot-affectedbusterpackage

Примечания

  • https://gitlab.com/qemu-project/qemu/-/issues/1268

  • Introduced by: https://gitlab.com/qemu-project/qemu/-/commit/f7e26ffa590ff26b4c6a2c513ad9ba1e6156f5b8 (v7.0.0-rc0)

  • Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/defb70980f6bed36100b74e84220f1764c0dd544 (v7.2.0-rc0)

  • https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk@c--e.de/

EPSS

Процентиль: 5%
0.00023
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.

CVSS3: 6
redhat
больше 2 лет назад

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.

CVSS3: 6.5
nvd
больше 2 лет назад

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.

CVSS3: 6.5
github
больше 2 лет назад

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость функций read_erst_record() и write_erst_record() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 5%
0.00023
Низкий