Vulnerability CVE-2023-3255: Information
Description
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
qemu | sisyphus | 8.0.4-alt1 | 8.2.3-alt1 | ALT-PU-2023-5106-1 | 327667 | Fixed |
qemu | sisyphus_loongarch64 | 8.2.0-alt0.0.port | 8.2.3-alt1 | ALT-PU-2024-1781-1 | - | Fixed |
qemu | p10 | 8.0.4-alt1.p10 | 8.2.2-alt0.p10.1 | ALT-PU-2023-5241-3 | 328289 | Fixed |
qemu | c10f1 | 8.0.4-alt1.p10 | 8.2.2-alt0.p10.1 | ALT-PU-2023-7183-2 | 334310 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-3255 |
|
https://bugzilla.redhat.com/show_bug.cgi?id=2218486 |
|
https://security.netapp.com/advisory/ntap-20231020-0008/ |
|
RHSA-2024:2135 | |
RHSA-2024:2962 |