Oval Definition:oval:com.ubuntu.xenial:def:2017151180000000
Revision Date:2018-07-27Version:1
Title:CVE-2017-15118 on Ubuntu 16.04 LTS (xenial) - medium.
Description:A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-15118
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • NOT qemu package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-block-extra package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-guest-agent package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-kvm package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-aarch64 package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-arm package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-common package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-mips package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-misc package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-ppc package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-s390x package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-sparc package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-system-x86 package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-user package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-user-binfmt package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-user-static package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • OR NOT qemu-utils package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
  • BACK