A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1973784 | issue tracking third party advisory mitigation |
https://gitlab.com/qemu-project/qemu/-/issues/542 | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20220624-0001/ | third party advisory |
https://security.gentoo.org/glsa/202208-27 | third party advisory vendor advisory |