ALT-PU-2018-1076-1
Closed vulnerabilities
BDU:2019-04100
Уязвимость сервера Network Block Device (NBD) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15118
A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
- http://www.openwall.com/lists/oss-security/2017/11/28/8
- http://www.openwall.com/lists/oss-security/2017/11/28/8
- 101975
- 101975
- RHSA-2018:1104
- RHSA-2018:1104
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15118
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15118
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html
- USN-3575-1
- USN-3575-1
- 43194
- 43194
Modified: 2024-11-21
CVE-2017-15119
The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
- http://www.openwall.com/lists/oss-security/2017/11/28/9
- http://www.openwall.com/lists/oss-security/2017/11/28/9
- 102011
- 102011
- RHSA-2018:1104
- RHSA-2018:1104
- RHSA-2018:1113
- RHSA-2018:1113
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html
- USN-3575-1
- USN-3575-1
- DSA-4213
- DSA-4213