First published: Tue Mar 29 2022(Updated: )
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <2.20.1 | |
redhat/qemu | <8.0.0 | 8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1050 is a vulnerability found in the QEMU implementation of VMWare's paravirtual RDMA device, which allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.
CVE-2022-1050 can allow a malicious guest driver to execute HW commands in QEMU, potentially leading to a use-after-free condition.
QEMU versions up to and including 2.20.1, as well as Red Hat QEMU version 8.0.0, are affected by CVE-2022-1050.
CVE-2022-1050 has a severity rating of 8.8, which is considered high.
To mitigate the risk of CVE-2022-1050, it is recommended to update QEMU to a version that includes the fix for this vulnerability.