发布时间: 2022年5月20日
修改时间: 2024年10月31日
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values cursor->header.width and cursor->header.height can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Local | Local |
CVSS评分 | 8.2 | 8.8 |
Attack Complexity | Low | Low |
Privileges Required | High | Low |
Scope | Changed | Changed |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1477 | qemu security update | 2022年5月20日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | qemu | Fixed |
KY3.4-5 | qemu | Fixed |
KY3.5.1 | qemu | Fixed |