First published: Mon Nov 07 2022(Updated: )
An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <7.1.0 | |
QEMU qemu | =7.1.0 | |
QEMU qemu | =7.1.0-rc0 | |
QEMU qemu | =7.1.0-rc1 | |
QEMU qemu | =7.1.0-rc2 | |
QEMU qemu | =7.1.0-rc3 | |
QEMU qemu | =7.1.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3872.
The severity of CVE-2022-3872 is high with a score of 8.6.
CVE-2022-3872 affects QEMU version up to and excluding 7.1.0.
A malicious guest could exploit CVE-2022-3872 to crash the QEMU process on the host.
You can find more information about CVE-2022-3872 in the references: [1](https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html), [2](https://security.netapp.com/advisory/ntap-20221215-0005/).