NA

CVE-2022-2962

Published: 13/09/2022 Updated: 28/06/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

It exists that the QEMU SCSI device emulation incorrectly handled certain MODE SELECT commands. An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2021-3930)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

Vendor Advisories

Debian Bug report logs - #1018055 qemu: CVE-2022-2962: tulip: DMA reentrancy issue leads to stack or heap overflow Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 24 Aug 2022 19:54:02 UTC Severity ...
Several security issues were fixed in QEMU ...
A DMA reentrancy issue was found in the Tulip device emulation in QEMU When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow A malicious g ...