An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html | Mailing List Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221215-0005/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2022-11-07T00:00:00
Updated: 2022-12-15T00:00:00
Reserved: 2022-11-07T00:00:00
Link: CVE-2022-3872
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-07T21:15:09.610
Modified: 2023-02-23T01:35:36.783
Link: CVE-2022-3872
JSON object: View
Redhat Information
No data.
CWE