A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182 | Patch Third Party Advisory |
https://gitlab.com/qemu-project/qemu/-/issues/1171 | Exploit Issue Tracking Third Party Advisory |
https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182 | Patch Third Party Advisory |
https://gitlab.com/qemu-project/qemu/-/issues/1171 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182 - Patch, Third Party Advisory | |
References | () https://gitlab.com/qemu-project/qemu/-/issues/1171 - Exploit, Issue Tracking, Third Party Advisory |
28 Jun 2023, 20:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-662 |
Information
Published : 2022-09-13 20:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2962
Mitre link : CVE-2022-2962
CVE.ORG link : CVE-2022-2962
JSON object : View
Products Affected
qemu
- qemu