CVE-2022-3872

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:-:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc4:*:*:*:*:*:*

History

23 Feb 2023, 01:35

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20221215-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20221215-0005/ - Third Party Advisory

15 Dec 2022, 19:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20221215-0005/ -

09 Nov 2022, 19:49

Type Values Removed Values Added
CPE cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:-:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:7.1.0:rc4:*:*:*:*:*:*
References (MISC) https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html - (MISC) https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html - Mailing List, Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6
First Time Qemu qemu
Qemu

07 Nov 2022, 21:32

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-07 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-3872

Mitre link : CVE-2022-3872

CVE.ORG link : CVE-2022-3872


JSON object : View

Products Affected

qemu

  • qemu
CWE
CWE-193

Off-by-one Error