Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2017-15119

Published: 28 November 2017

The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.

Notes

AuthorNote
mdeslaur
trusty already has a length check there

Priority

Medium

CVSS 3 base score: 8.6

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
artful
Released (1:2.10+dfsg-0ubuntu3.5)
precise Does not exist

trusty Not vulnerable

upstream
Released (2.11)
xenial
Released (1:2.5+dfsg-5ubuntu10.22)
zesty Ignored
(reached end-of-life)
Patches:
upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=fdad35ef6c5839d50dfc14073364ac893afebc30
qemu-kvm
Launchpad, Ubuntu, Debian
artful Does not exist

precise Not vulnerable

trusty Does not exist

upstream Needs triage

xenial Does not exist

zesty Does not exist