First published: Tue Dec 05 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.10.2 | |
QEMU | =2.11.0-rc0 | |
QEMU | =2.11.0-rc1 | |
QEMU | =2.11.0-rc2 | |
QEMU | =2.11.0-rc3 | |
Debian Linux | =9.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.2+ds-1 1:10.0.0~rc1+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17381 has a severity rating that may lead to a denial of service by crashing the QEMU process.
To fix CVE-2017-17381, upgrade to a version of QEMU that is patched against this vulnerability.
The impact of CVE-2017-17381 allows local OS guest users to crash the QEMU process, leading to a denial of service.
Affected software versions include QEMU versions prior to 2.10.3 and specific Debian packages as noted.
CVE-2017-17381 is not exploitable remotely as it requires local OS guest user access to trigger the vulnerability.