Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 877609 (CVE-2022-3165, CVE-2022-3872)

Summary: app-emulation/qemu: multiple vulnerabilities
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: normal CC: ajak, sam, tamiko, virtualization, zlogene
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: A3 [upstream/ebuild]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-19 02:32:16 UTC
CVE-2022-3165:

An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.

Patch: https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-08 01:48:38 UTC
CVE-2022-3872 (https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html):

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Patch at above URL, doesn't seem to have made it into git yet.