CVE-2017-10664
Description
qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
QEMU's qemu-nbd server crashes when a client disconnects prematurely because the daemon does not ignore SIGPIPE, enabling remote denial of service.
Vulnerability
The qemu-nbd server in QEMU (Quick Emulator) fails to ignore SIGPIPE signals. When a client disconnects during a server-to-client reply attempt, the SIGPIPE signal is triggered and, because it is not handled, causes the qemu-nbd daemon to crash. This affects QEMU versions shipped in Red Hat Enterprise Linux 7 (qemu-kvm up to version 1.5.3-141.el7_4.1) and the qemu-kvm-rhev package used in Red Hat Virtualization and OpenStack environments [1][2][3][4].
Exploitation
An attacker needs only network access to the qemu-nbd server (default port 10809). The attacker establishes a connection and then abruptly disconnects—for example by closing the TCP socket—during any phase where the server attempts to send data (negotiation or read reply). No authentication is required, and no special privileges are needed. The action is remote and can be performed by any unprivileged network client [1][2].
Impact
A successful exploit causes the qemu-nbd daemon to crash, resulting in a denial of service (DoS). All active NBD connections and any dependent virtual machine operations relying on the NBD export are terminated. The crash does not lead to data loss, privilege escalation, or code execution beyond the denial of service [2][3][4].
Mitigation
Red Hat released fixed packages for RHEL 7 (qemu-kvm-1.5.3-141.el7_4.1) on 2017-08-02 [1], for RHEV (qemu-kvm-rhev) on 2017-08-01 [2], and for Red Hat OpenStack Platform on 2017-12-14 [3][4]. Users should update to the patched versions. The fix ensures that SIGPIPE is ignored (by setting the signal handler to SIG_IGN), preventing the crash. After updating, all virtual machines must be shut down and restarted for the fix to take effect [2]. No workaround other than applying the update is documented.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
35- osv-coords35 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/qemu&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%206
< 6.1.0-32.1+ 34 more
- (no CPE)range: < 6.1.0-32.1
- (no CPE)range: < 1.4.2-53.11.1
- (no CPE)range: < 1.4.2-53.11.1
- (no CPE)range: < 1.4.2-53.11.1
- (no CPE)range: < 1.4.2-60.3.1
- (no CPE)range: < 1.4.2-60.3.1
- (no CPE)range: < 2.6.2-41.22.2
- (no CPE)range: < 2.9.0-6.3.1
- (no CPE)range: < 2.3.1-33.3.3
- (no CPE)range: < 2.6.2-41.22.2
- (no CPE)range: < 2.9.0-6.3.1
- (no CPE)range: < 2.0.2-48.34.3
- (no CPE)range: < 2.6.2-41.22.2
- (no CPE)range: < 2.3.1-33.3.3
- (no CPE)range: < 2.6.2-41.22.2
- (no CPE)range: < 2.9.0-6.3.1
- (no CPE)range: < 2.3.1-33.3.3
- (no CPE)range: < 4.7.3_03-43.9.1
- (no CPE)range: < 4.9.0_11-3.9.1
- (no CPE)range: < 4.2.5_21-45.5.1
- (no CPE)range: < 4.2.5_21-45.5.1
- (no CPE)range: < 4.4.4_22-61.9.2
- (no CPE)range: < 4.5.5_14-22.25.1
- (no CPE)range: < 4.7.3_03-43.9.1
- (no CPE)range: < 4.9.0_11-3.9.1
- (no CPE)range: < 4.4.4_22-22.51.2
- (no CPE)range: < 4.4.4_22-61.9.2
- (no CPE)range: < 4.4.4_22-22.51.2
- (no CPE)range: < 4.5.5_14-22.25.1
- (no CPE)range: < 4.7.3_03-43.9.1
- (no CPE)range: < 4.9.0_11-3.9.1
- (no CPE)range: < 4.4.4_22-61.9.2
- (no CPE)range: < 4.7.3_03-43.9.1
- (no CPE)range: < 4.9.0_11-3.9.1
- (no CPE)range: < 4.5.5_14-22.25.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- www.openwall.com/lists/oss-security/2017/06/29/1nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.htmlnvdMailing ListPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3920nvdThird Party Advisory
- www.securityfocus.com/bid/99513nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:2390nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2445nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3466nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3470nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3471nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3472nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3473nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3474nvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlnvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.