Description
An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
References (4)
Core 4
Core References
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I36LKZA7Z65J3LJU2P37LVTWDFTXBMPU/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/
Patch, Third Party Advisory
https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
Third Party Advisory
https://security.netapp.com/advisory/ntap-20221223-0006/
Scores
CVSS v3
6.5
EPSS
0.0015
EPSS Percentile
35.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-191
Status
published
Products (3)
fedoraproject/fedora
36
fedoraproject/fedora
37
qemu/qemu
6.1.0 - 7.1.0
Published
Oct 17, 2022
Tracked Since
Feb 18, 2026