Vulnerability Details : CVE-2022-35414
softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considered security bugs at this time.
Products affected by CVE-2022-35414
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-35414
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-35414
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:C |
3.9
|
8.5
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
2.0
|
6.0
|
NIST |
CWE ids for CVE-2022-35414
-
The product uses or accesses a resource that has not been initialized.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-35414
-
https://github.com/qemu/qemu/commit/3517fb726741c109cae7995f9ea46f0cab6187d6#diff-83c563ed6330dc5d49876f1116e7518b5c16654bbc6e9b4ea8e28f5833d576fcR482.aa
target/loongarch: Clean up tlb when cpu reset · qemu/qemu@3517fb7 · GitHubPatch;Third Party Advisory
-
https://sick.codes/sick-2022-113
CVE-2022-35414 - QEMU 4.1.50 through QEMU 7.0.0 - address_space_translate_for_iotlb allows a guest user to crash a host resulting in a denial of service. - Sick Codes - Security Research, Hardware & SExploit;Patch;Third Party Advisory
-
https://gitlab.com/qemu-project/qemu/-/issues/1065
cputlb: uninitialized local variable in tlb_set_page_with_attrs cause SIGSEGV when a CPU access an unmapped IOMMU page (#1065) · Issues · QEMU / QEMU · GitLabIssue Tracking;Mitigation;Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
[SECURITY] [DLA 3099-1] qemu security updateMailing List;Third Party Advisory
-
https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c
softmmu: Always initialize xlat in address_space_translate_for_iotlb · qemu/qemu@418ade7 · GitHubPatch;Third Party Advisory
-
https://www.mail-archive.com/qemu-devel@nongnu.org/msg895266.html
Re: [PATCH v2] softmmu: Always initialize xlat in address_space_translate_for_iotlbMailing List;Third Party Advisory
-
https://www.mail-archive.com/qemu-devel%40nongnu.org/msg895266.html
Re: [PATCH v2] softmmu: Always initialize xlat in address_space_translate_for_iotlb
-
https://github.com/qemu/qemu/blob/v7.0.0/include/exec/cpu-all.h#L145-L148
qemu/cpu-all.h at v7.0.0 · qemu/qemu · GitHubRelease Notes;Third Party Advisory
-
https://github.com/qemu/qemu/commit/3517fb726741c109cae7995f9ea46f0cab6187d6#diff-83c563ed6330dc5d49876f1116e7518b5c16654bbc6e9b4ea8e28f5833d576fcR482
target/loongarch: Clean up tlb when cpu reset · qemu/qemu@3517fb7 · GitHubPatch;Third Party Advisory
-
https://www.qemu.org/docs/master/system/security.html#non-virtualization-use-case
Security — QEMU documentationVendor Advisory
-
https://github.com/qemu/qemu/blob/f200ff158d5abcb974a6b597a962b6b2fbea2b06/softmmu/physmem.c
Patch;Third Party Advisory
Jump to