CVE-2022-4144 — Out-of-bounds Read in Qemu
Severity
6.5MEDIUMNVD
OSV8.8
EPSS
0.0%
top 94.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 29
Latest updateJun 19
Description
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0
Affected Packages4 packages
Also affects: Fedora 37, Enterprise Linux 8.0
Patches
🔴Vulnerability Details
4OSV▶
CVE-2022-4144: An out-of-bounds read flaw was found in the QXL display device emulation in QEMU↗2022-11-29
GHSA▶
GHSA-rc5v-q774-439g: An out-of-bounds read flaw was found in the QXL display device emulation in QEMU↗2022-11-29
CVEList▶
CVE-2022-4144: An out-of-bounds read flaw was found in the QXL display device emulation in QEMU↗2022-11-29
💥Exploits & PoCs
1Nuclei▶
WordPress Fontsy <=1.8.6 - SQL Injection
📋Vendor Advisories
4Red Hat
▶
Microsoft▶
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address potenti↗2022-11-08
Debian▶
CVE-2022-4144: qemu - An out-of-bounds read flaw was found in the QXL display device emulation in QEMU...↗2022