An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
References
Link | Resource |
---|---|
https://gitlab.com/qemu-project/qemu/-/commit/d307040b18 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I36LKZA7Z65J3LJU2P37LVTWDFTXBMPU/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/ | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221223-0006/ | Third Party Advisory |
Information
Published : 2022-10-17 09:15
Updated : 2023-01-20 05:33
NVD link : CVE-2022-3165
Mitre link : CVE-2022-3165
JSON object : View
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
Products Affected
fedoraproject
- fedora
qemu
- qemu