An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.
References
Link | Resource |
---|---|
https://gitlab.com/qemu-project/qemu/-/commit/defb7098 | Patch Third Party Advisory |
https://gitlab.com/qemu-project/qemu/-/issues/1268 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/ | |
https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/ | |
https://security.netapp.com/advisory/ntap-20230127-0013/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2022-11-29T00:00:00
Updated: 2023-01-27T00:00:00
Reserved: 2022-11-28T00:00:00
Link: CVE-2022-4172
JSON object: View
NVD Information
Status : Modified
Published: 2022-11-29T18:15:10.623
Modified: 2023-11-07T03:57:08.283
Link: CVE-2022-4172
JSON object: View
Redhat Information
No data.
CWE