QEMU (aka Quick Emulator) built with a VMWARE VMXNET3...
Moderate severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Feb 20, 2023
Description
Published by the National Vulnerability Database
Dec 29, 2016
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Feb 20, 2023
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
References