First published: Thu Sep 28 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | <=1:2.10.0+dfsg-2<=1:2.8+dfsg-6 | |
QEMU KVM | <=2.10.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15268 has been classified as a moderate severity vulnerability due to its potential for causing memory leaks.
To fix CVE-2017-15268, upgrade to a patched version of QEMU such as 1:5.2+dfsg-11+deb11u3 or newer.
CVE-2017-15268 affects QEMU versions up to and including 2.10.0 that support I/O channels with websockets.
CVE-2017-15268 allows remote attackers to exploit slow data-channel read operations, leading to a memory leak.
You can determine vulnerability by checking if your QEMU version is 2.10.0 or earlier and if it includes websockets support.