Improper Input Validation Affecting qemu package, versions <1:2.12~rc3+dfsg-1


0.0
high

Snyk CVSS

    Attack Complexity Low
    Availability High

    Threat Intelligence

    EPSS 0.71% (81st percentile)
Expand this section
NVD
7.5 high
Expand this section
Red Hat
3.5 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN11-QEMU-519172
  • published 9 Jan 2018
  • disclosed 9 Jan 2018

How to fix?

Upgrade Debian:11 qemu to version 1:2.12~rc3+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qemu package and not the qemu package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.