First published: Wed Aug 23 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.9.1 | |
QEMU qemu | =2.10.0-rc0 | |
QEMU qemu | =2.10.0-rc1 | |
QEMU qemu | =2.10.0-rc2 | |
Debian Debian Linux | =9.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12809 is a vulnerability in QEMU (aka Quick Emulator) that allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive.
QEMU versions 1:2.5+dfsg-5ubuntu10.15, 1:2.8+dfsg-3ubuntu2.4, 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u10, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u1, 1:8.1.0+ds-6, and 1:8.1.1+ds-1 on Ubuntu and Debian systems are affected.
CVE-2017-12809 has a severity rating of 6.5, which is classified as medium.
To fix CVE-2017-12809, update QEMU to version 1:2.5+dfsg-5ubuntu10.15 on Ubuntu systems or version 1:2.8+dfsg-3ubuntu2.4 on Debian systems.
You can find more information about CVE-2017-12809 at the following references: http://www.openwall.com/lists/oss-security/2017/08/21/2, https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg01850.html, http://www.securityfocus.com/bid/100451