An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html | Mailing List Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221215-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Feb 2023, 01:35
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20221215-0005/ - Third Party Advisory |
15 Dec 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Nov 2022, 19:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
References | (MISC) https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html - Mailing List, Patch, Third Party Advisory | |
CPE | cpe:2.3:a:qemu:qemu:7.1.0:-:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:7.1.0:rc1:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:7.1.0:rc4:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:7.1.0:rc2:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:7.1.0:rc0:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:7.1.0:rc3:*:*:*:*:*:* |
07 Nov 2022, 21:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-07 21:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-3872
Mitre link : CVE-2022-3872
CVE.ORG link : CVE-2022-3872
JSON object : View
Products Affected
qemu
- qemu
CWE
CWE-193
Off-by-one Error