Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 877609 (CVE-2022-3165, CVE-2022-3872) - app-emulation/qemu: multiple vulnerabilities
Summary: app-emulation/qemu: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2022-3165, CVE-2022-3872
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A3 [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-10-19 02:32 UTC by John Helmert III
Modified: 2022-11-08 01:48 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-19 02:32:16 UTC
CVE-2022-3165:

An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.

Patch: https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-08 01:48:38 UTC
CVE-2022-3872 (https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html):

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Patch at above URL, doesn't seem to have made it into git yet.