CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
28.1%
The address_space_write_continue function in exec.c in QEMU (aka Quick
Emulator) allows local guest OS privileged users to cause a denial of
service (out-of-bounds access and guest instance crash) by leveraging use
of qemu_map_ram_ptr to access guest ram block area.
Author | Note |
---|---|
mdeslaur | second commit doesn’t look right, lock variable used in dma field, needs more investigation This issue caused a regression for Xen users, and was reverted in USN 3575-2. Since this is a low-severity issue, we are not going to include it in a subsequent update. |
launchpad.net/bugs/cve/CVE-2017-11334
lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.html
nvd.nist.gov/vuln/detail/CVE-2017-11334
security-tracker.debian.org/tracker/CVE-2017-11334
ubuntu.com/security/notices/USN-3575-1
ubuntu.com/security/notices/USN-3575-2
www.cve.org/CVERecord?id=CVE-2017-11334
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
28.1%