First published: Tue Dec 05 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | <=2.10.2 | |
QEMU KVM | =2.11.0-rc0 | |
QEMU KVM | =2.11.0-rc1 | |
QEMU KVM | =2.11.0-rc2 | |
QEMU KVM | =2.11.0-rc3 | |
Debian Debian Linux | =9.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17381 has a severity rating that may lead to a denial of service by crashing the QEMU process.
To fix CVE-2017-17381, upgrade to a version of QEMU that is patched against this vulnerability.
The impact of CVE-2017-17381 allows local OS guest users to crash the QEMU process, leading to a denial of service.
Affected software versions include QEMU versions prior to 2.10.3 and specific Debian packages as noted.
CVE-2017-17381 is not exploitable remotely as it requires local OS guest user access to trigger the vulnerability.