Loop with Unreachable Exit Condition ('Infinite Loop') Affecting qemu-kvm-block-iscsi package, versions <15:6.2.0-49.module+el8.10.0+90330+d0258130
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-QEMUKVMBLOCKISCSI-5949772
- published 8 Oct 2023
- disclosed 13 Sep 2023
Introduced: 13 Sep 2023
CVE-2023-3255 Open this link in a new tabHow to fix?
Upgrade Oracle:8 qemu-kvm-block-iscsi to version 15:6.2.0-49.module+el8.10.0+90330+d0258130 or higher.
This issue was patched in ELSA-2024-2962.
NVD Description
Note: Versions mentioned in the description apply only to the upstream qemu-kvm-block-iscsi package and not the qemu-kvm-block-iscsi package as distributed by Oracle.
See How to fix? for Oracle:8 relevant fixed versions and status.
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the inflate_buffer function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
References
- https://linux.oracle.com/cve/CVE-2023-3255.html
- https://linux.oracle.com/errata/ELSA-2023-12855.html
- https://linux.oracle.com/errata/ELSA-2024-2962.html
- https://access.redhat.com/security/cve/CVE-2023-3255
- https://bugzilla.redhat.com/show_bug.cgi?id=2218486
- https://security.netapp.com/advisory/ntap-20231020-0008/
- https://access.redhat.com/errata/RHSA-2024:2135
- https://access.redhat.com/errata/RHSA-2024:2962