Medium severity4.4NVD Advisory· Published Aug 2, 2017· Updated May 13, 2026
CVE-2017-11334
CVE-2017-11334
Description
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
Affected products
2- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- www.openwall.com/lists/oss-security/2017/07/17/4nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.htmlnvdMailing ListPatchVendor Advisory
- www.debian.org/security/2017/dsa-3925nvdThird Party Advisory
- www.securityfocus.com/bid/99895nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:3369nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3466nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3470nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3471nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3472nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3473nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3474nvdThird Party Advisory
- usn.ubuntu.com/3575-1/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.