An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html | Mailing List Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221215-0005/ | Third Party Advisory |
https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html | Mailing List Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221215-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html - Mailing List, Patch, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20221215-0005/ - Third Party Advisory |
Information
Published : 2022-11-07 21:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-3872
Mitre link : CVE-2022-3872
CVE.ORG link : CVE-2022-3872
JSON object : View
Products Affected
qemu
- qemu
CWE
CWE-193
Off-by-one Error