Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-4144

Опубликовано: 25 нояб. 2022
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest's physical address, potentially reading past the end of the bar space into adjacent pages. This could allow a malicious guest user to crash the QEMU process on the host, causing a denial of service. Spice was found to be affected by the same CVE.

Отчет

The versions of qemu-kvm as shipped with Red Hat Enterprise Linux 9 are not affected by this flaw as they do not include support for QXL display device emulation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6qemu-kvmOut of support scope
Red Hat Enterprise Linux 6spice-serverOut of support scope
Red Hat Enterprise Linux 7qemu-kvmOut of support scope
Red Hat Enterprise Linux 7qemu-kvm-maOut of support scope
Red Hat Enterprise Linux 7spiceOut of support scope
Red Hat Enterprise Linux 8spiceWill not fix
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:8.2/qemu-kvmWill not fix
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:av/qemu-kvmWill not fix
Red Hat Enterprise Linux 9qemu-kvmNot affected
Red Hat OpenStack Platform 13 (Queens)qemu-kvm-rhevOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2148506QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read

EPSS

Процентиль: 1%
0.0001
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

CVSS3: 6.5
nvd
больше 2 лет назад

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

CVSS3: 6.5
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 6.5
debian
больше 2 лет назад

An out-of-bounds read flaw was found in the QXL display device emulati ...

suse-cvrf
около 2 лет назад

Security update for qemu

EPSS

Процентиль: 1%
0.0001
Низкий

6.5 Medium

CVSS3