An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
History

Mon, 14 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-04-14T18:09:55.614Z

Reserved: 2022-11-25T00:00:00.000Z

Link: CVE-2022-4144

cve-icon Vulnrichment

Updated: 2024-08-03T01:27:54.545Z

cve-icon NVD

Status : Modified

Published: 2022-11-29T18:15:10.550

Modified: 2025-04-14T18:15:24.910

Link: CVE-2022-4144

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-11-25T00:00:00Z

Links: CVE-2022-4144 - Bugzilla