First published: Fri Jun 09 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.9.1 | |
Debian Debian Linux | =9.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2017-9524.
The severity level of CVE-2017-9524 is medium.
The vulnerability in CVE-2017-9524 allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the qemu-nbd server in QEMU.
The affected software versions for CVE-2017-9524 include qemu 1:2.8+dfsg-3ubuntu2.4 in Ubuntu, and qemu 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u10, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u1, 1:8.0.4+dfsg-3, and 1:8.1.0+ds-6 in Debian.
Yes, there are remedies available for the affected software versions of CVE-2017-9524. For Ubuntu, the remedy is qemu 1:2.8+dfsg-3ubuntu2.4. For Debian, the remedies include qemu 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u10, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u1, 1:8.0.4+dfsg-3, and 1:8.1.0+ds-6.