| Revision Date: | 2018-07-27 | Version: | 1 | | Title: | CVE-2017-15118 on Ubuntu 16.04 LTS (xenial) - medium. | | Description: | A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
| | Family: | unix | Class: | vulnerability | | Status: | | Reference(s): | CVE-2017-15118
| | Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | | Definition Synopsis | | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT qemu package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-block-extra package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-guest-agent package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-kvm package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-aarch64 package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-arm package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-common package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-mips package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-misc package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-ppc package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-s390x package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-sparc package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-system-x86 package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-user package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-user-binfmt package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-user-static package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT qemu-utils package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
|
|