Improper Input Validation Affecting qemu-project/qemu package, versions [0.1.0,1.1]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-QEMUPROJECTQEMU-3006998
  • published26 Jan 2022
  • disclosed21 Jun 2012
  • creditUnknown

Introduced: 21 Jun 2012

CVE-2011-1751  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

There is no fixed version for qemu-project/qemu.

Overview

Affected versions of this package are vulnerable to Improper Input Validation. The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."

CVSS Scores

version 3.1