Off-by-one Error Affecting qemu-project/qemu package, versions [,2.6.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-QEMUPROJECTQEMU-3007145
  • published26 Jan 2022
  • disclosed29 Dec 2016
  • creditUnknown

Introduced: 29 Dec 2016

CVE-2015-8701  (opens in a new tab)
CWE-193  (opens in a new tab)

How to fix?

Upgrade qemu-project/qemu to version 2.6.0 or higher.

Overview

Affected versions of this package are vulnerable to Off-by-one Error. QEMU (aka Quick Emulator) built with the Rocker switch emulation support is vulnerable to an off-by-one error. It happens while processing transmit (tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (ROCKER_TX_FRAGS_MAX=16) fragments. A privileged user inside guest could use this flaw to cause memory leakage on the host or crash the QEMU process instance resulting in DoS issue.

References

CVSS Scores

version 3.1