A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182 | Patch Third Party Advisory |
https://gitlab.com/qemu-project/qemu/-/issues/1171 | Exploit Issue Tracking Third Party Advisory |
https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182 | Patch Third Party Advisory |
https://gitlab.com/qemu-project/qemu/-/issues/1171 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-09-13 20:15
Updated : 2025-04-23 18:15
NVD link : CVE-2022-2962
Mitre link : CVE-2022-2962
CVE.ORG link : CVE-2022-2962
JSON object : View
Products Affected
qemu
- qemu