SB2023021573 - Integer overflow in QEMU
Published: February 15, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2022-4172)
The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow within the read_erst_record() and write_erst_record() functions in the ACPI Error Record Serialization Table (ERST) device of QEMU. A malicious guest can overrun the host buffer allocated for the ERST memory device and crash the QEMU process on the host.
Remediation
Install update from vendor's website.
References
- https://gitlab.com/qemu-project/qemu/-/commit/defb7098
- https://gitlab.com/qemu-project/qemu/-/issues/1268
- https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk@c--e.de/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/
- https://security.netapp.com/advisory/ntap-20230127-0013/