First published: Wed Jan 31 2018(Updated: )
Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | >=1.5.0<=2.10.1 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.1+ds-1 1:9.2.2+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-18043 is considered high as it allows for denial of service through a crash of the Qemu process.
To fix CVE-2017-18043, update Qemu to a version that includes the mitigation or patch for the integer overflow issue.
CVE-2017-18043 affects Qemu versions between 1.5.0 and 2.10.1 inclusively.
Yes, Debian versions 9.0 and Qemu packages within specific version ranges are affected by CVE-2017-18043.
CVE-2017-18043 impacts various versions of Debian GNU/Linux and Ubuntu Linux, particularly versions 14.04, 16.04, and 17.10.