CVE Vulnerabilities

CVE-2022-3872

Off-by-one Error

Published: Nov 07, 2022 | Modified: May 05, 2025
CVSS 3.x
8.6
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6 MODERATE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Weakness

A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

Affected Software

NameVendorStart VersionEnd Version
QemuQemu*7.1.0 (excluding)
QemuQemu7.1.0 (including)7.1.0 (including)
QemuQemu7.1.0-rc0 (including)7.1.0-rc0 (including)
QemuQemu7.1.0-rc1 (including)7.1.0-rc1 (including)
QemuQemu7.1.0-rc2 (including)7.1.0-rc2 (including)
QemuQemu7.1.0-rc3 (including)7.1.0-rc3 (including)
QemuQemu7.1.0-rc4 (including)7.1.0-rc4 (including)
QemuUbuntubionic*
QemuUbuntufocal*
QemuUbuntukinetic*
QemuUbuntulunar*
QemuUbuntumantic*
QemuUbuntuoracular*
QemuUbuntuplucky*
QemuUbuntutrusty*
QemuUbuntutrusty/esm*
QemuUbuntuxenial*

Potential Mitigations

References