Description
A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.
References (3)
Core 3
Core References
Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2021869
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20220318-0003/
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202208-27
Scores
CVSS v3
5.5
EPSS
0.0006
EPSS Percentile
18.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-125
Status
published
Products (2)
qemu/qemu
6.2.0 rc0 (2 CPE variants)
qemu/qemu
6.0.0 - 6.1.0
Published
Feb 18, 2022
Tracked Since
Feb 18, 2026