First published: Fri Oct 06 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | <=1:2.1+dfsg-11<=1:2.10.0+dfsg-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | <=2.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-15038 is classified as medium due to its impact on information disclosure.
To fix CVE-2017-15038, update QEMU to versions 1:5.2+dfsg-11+deb11u3, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u12, or later.
Affected versions of QEMU include those prior to 2.9.1 and from 1:2.1+dfsg-11 to 1:2.10.0+dfsg-1.
Yes, guest users can exploit CVE-2017-15038 to potentially access restricted information by exploiting the race condition.
CVE-2017-15038 is an information disclosure vulnerability that occurs during access to extended file attributes in a VirtFS setup.