CVE-2022-4144Out-of-bounds Read in Qemu

CWE-125Out-of-bounds Read10 documents9 sources
Severity
6.5MEDIUMNVD
OSV8.8
EPSS
0.0%
top 94.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 29
Latest updateJun 19

Description

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages4 packages

Debianqemu/qemu< 1:7.2+dfsg-1+2
Ubuntuqemu/qemu< 1:4.2-3ubuntu6.27+4
NVDqemu/qemu7.1.0

Also affects: Fedora 37, Enterprise Linux 8.0

Patches

🔴Vulnerability Details

4
OSV
qemu vulnerabilities2023-06-19
OSV
CVE-2022-4144: An out-of-bounds read flaw was found in the QXL display device emulation in QEMU2022-11-29
GHSA
GHSA-rc5v-q774-439g: An out-of-bounds read flaw was found in the QXL display device emulation in QEMU2022-11-29
CVEList
CVE-2022-4144: An out-of-bounds read flaw was found in the QXL display device emulation in QEMU2022-11-29

💥Exploits & PoCs

1
Nuclei
WordPress Fontsy <=1.8.6 - SQL Injection

📋Vendor Advisories

4
Ubuntu
QEMU vulnerabilities2023-06-19
Red Hat
QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read2022-11-25
Microsoft
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address potenti2022-11-08
Debian
CVE-2022-4144: qemu - An out-of-bounds read flaw was found in the QXL display device emulation in QEMU...2022
CVE-2022-4144 — Out-of-bounds Read in Qemu | cvebase