First published: Tue Aug 29 2017(Updated: )
Quick emulator(Qemu) built with the VGA display emulator support is vulnerable to an assert failure issue. It could occur while updating graphics display, due to miscalculating region for dirty bitmap snapshot in split screen mode. A privileged user/process inside guest could use this flaw to crash the Qemu process on the host resulting in DoS. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05333.html">https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05333.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/08/30/4">http://www.openwall.com/lists/oss-security/2017/08/30/4</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:3.1+dfsg-8+deb10u8 1:3.1+dfsg-8+deb10u11 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u3 1:8.1.2+ds-1 1:8.2.0+ds-1 | |
QEMU KVM | =2.8.0 | |
QEMU KVM | =2.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13673 has a medium severity rating due to its potential to crash the graphics display in a vulnerable environment.
To fix CVE-2017-13673, update to the recommended versions of QEMU, specifically those addressing this vulnerability.
CVE-2017-13673 affects the VGA display emulator component of the QEMU virtualization software.
Privileged users or processes within guest systems running vulnerable versions of QEMU may be impacted by CVE-2017-13673.
CVE-2017-13673 is not directly exploitable remotely as it requires a privileged user within the guest system.