First published: Thu Jun 29 2023(Updated: )
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu | <8.1.0 | 8.1.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 | |
QEMU KVM | <=8.0.3 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3255 is a vulnerability found in the QEMU built-in VNC server while processing ClientCutText messages.
The severity of CVE-2023-3255 is medium (6.5).
CVE-2023-3255 affects QEMU versions up to but not including 8.1.0 and Red Hat Enterprise Linux versions 8.0 and 9.0.
To fix CVE-2023-3255, it is recommended to update QEMU to version 8.1.0 or apply the appropriate remedy provided by Red Hat.
More information about CVE-2023-3255 can be found at the following references: - [Red Hat Security Advisory](https://access.redhat.com/security/cve/CVE-2023-3255) - [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2218486) - [QEMU Developer Mailing List](https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg00596.html)