First published: Mon Sep 26 2022(Updated: )
An integer underflow issue was found in the QEMU VNC server while proc ...
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu | <7.2.0 | 7.2.0 |
QEMU | >=6.1.0<=7.1.0 | |
Fedora | =36 | |
Fedora | =37 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.1+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-3165.
The severity of CVE-2022-3165 is medium with a CVSS score of 6.5.
The affected software for CVE-2022-3165 includes QEMU versions up to 7.1.0, Ubuntu QEMU versions 1:6.2+dfsg-2ubuntu6.6 and 1:7.0+dfsg-7ubuntu2.1, Red Hat QEMU version 7.2.0, Fedora versions 36 and 37, and Debian QEMU versions 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u11, 1:5.2+dfsg-11+deb11u3, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u2, and 1:8.1.2+ds-1.
A malicious client can exploit CVE-2022-3165 by sending a specially crafted payload message to the QEMU VNC server while processing ClientCutText messages in the extended format.
The remedy for CVE-2022-3165 is to update QEMU to the recommended versions: Ubuntu QEMU 1:6.2+dfsg-2ubuntu6.6 or 1:7.0+dfsg-7ubuntu2.1, Red Hat QEMU 7.2.0, or Debian QEMU 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u11, 1:5.2+dfsg-11+deb11u3, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u2, or 1:8.1.2+ds-1.