NA

CVE-2022-3872

Published: 07/11/2022 Updated: 23/02/2023
CVSS v3 Base Score: 8.6 | Impact Score: 4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

qemu qemu 7.1.0

Vendor Advisories

Debian Bug report logs - #1024022 qemu: CVE-2022-3872 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 13 Nov 2022 19:39:06 UTC Severity: important Tags: security, upstream Reply or subscribe to t ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...