An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/ | |
https://gitlab.com/qemu-project/qemu/-/issues/1268 | third party advisory issue tracking exploit |
https://gitlab.com/qemu-project/qemu/-/commit/defb7098 | third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20230127-0013/ | third party advisory |