First published: Wed Jul 19 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.9.1 | |
QEMU qemu | =2.10.0-rc0 | |
QEMU qemu | =2.10.0-rc1 | |
QEMU qemu | =2.10.0-rc2 | |
QEMU qemu | =2.10.0-rc3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11434 is a vulnerability in QEMU that allows local guest OS users to cause a denial of service by triggering an out-of-bounds read and QEMU process crash.
QEMU versions 2.0.0+dfsg-2ubuntu1.35, 1:2.5+dfsg-5ubuntu10.15, 1:2.8+dfsg-3ubuntu2.4, and 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u10, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u1, and 1:8.1.0+ds-6 are affected.
CVE-2017-11434 has a severity rating of Low.
To fix CVE-2017-11434, update QEMU to version 2.0.0+dfsg-2ubuntu1.35 or later, 1:2.5+dfsg-5ubuntu10.15 or later, 1:2.8+dfsg-3ubuntu2.4 or later, or 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u10, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u1, or 1:8.1.0+ds-6.
You can find more details about CVE-2017-11434 at the following references: http://www.openwall.com/lists/oss-security/2017/07/19/2, https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg05001.html, and https://bugzilla.redhat.com/show_bug.cgi?id=1472611.