First published: Thu Nov 23 2017(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu | <2.11 | 2.11 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | <2.11.0 | |
Red Hat Enterprise Virtualization | =4.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15119 is classified as a denial-of-service vulnerability that can severely impact system performance.
To mitigate CVE-2017-15119, update the QEMU package to a version that is not affected, specifically 2.11 or later.
CVE-2017-15119 affects versions of QEMU prior to 2.11, as well as certain specific versions in Debian and Red Hat.
Yes, CVE-2017-15119 can be exploited remotely if an attacker sends large option requests to the vulnerable QEMU NBD server.
Systems using affected versions of QEMU, particularly Red Hat and Debian distributions, are vulnerable to CVE-2017-15119.