An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format [1]. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service condition. [1] https://github.com/rfbproto/rfbproto/blob/master/rfbproto.rst#extended-clipboard-pseudo-encoding
Proposed patch: https://lists.nongnu.org/archive/html/qemu-devel/2022-09/msg03948.html
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 2129759]
Upstream commit: https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2162 https://access.redhat.com/errata/RHSA-2023:2162
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2757 https://access.redhat.com/errata/RHSA-2023:2757
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-3165