A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-3180 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2222424 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/ | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230831-0008/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2023-08-03T14:31:36.083Z
Updated: 2024-01-23T02:29:25.701Z
Reserved: 2023-06-09T08:30:43.335Z
Link: CVE-2023-3180
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-08-03T15:15:29.960
Modified: 2023-11-07T14:50:08.863
Link: CVE-2023-3180
JSON object: View
Redhat Information
No data.