CVE-2017-18043Integer Overflow or Wraparound in Qemu

Severity
5.5MEDIUMNVD
OSV4.4
EPSS
0.1%
top 67.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 31
Latest updateMay 14

Description

Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.10.0+dfsg-2 (bookworm)
Debianqemu/qemu< 1:2.10.0+dfsg-2+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.39+3
NVDqemu/qemu1.5.02.10.1

Also affects: Debian Linux 9.0, Ubuntu Linux 14.04, 16.04, 17.10

🔴Vulnerability Details

4
GHSA
GHSA-74x7-8qq7-46q7: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash)2022-05-14
OSV
qemu regression2018-03-05
OSV
qemu vulnerabilities2018-02-20
OSV
CVE-2017-18043: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash)2018-01-31

📋Vendor Advisories

4
Ubuntu
QEMU regression2018-03-05
Ubuntu
QEMU vulnerabilities2018-02-20
Red Hat
Qemu: integer overflow in ROUND_UP macro could result in DoS2017-09-14
Debian
CVE-2017-18043: qemu - Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a ...2017

💬Community

3
Bugzilla
CVE-2017-18043 xen: Qemu: integer overflow in ROUND_UP macro could result in DoS [fedora-all]2018-01-19
Bugzilla
CVE-2017-18043 Qemu: integer overflow in ROUND_UP macro could result in DoS2018-01-19
Bugzilla
CVE-2017-18043 Qemu: integer overflow in ROUND_UP macro could result in DoS [fedora-all]2018-01-19