CVE-2017-16845Improper Input Validation in Qemu

Severity
10.0CRITICALNVD
OSV4.4
EPSS
2.1%
top 16.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 17
Latest updateMay 13

Description

hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.8

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.12~rc3+dfsg-1 (bookworm)
Debianqemu/qemu< 1:2.12~rc3+dfsg-1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.41+6
NVDqemu/qemu2.11.2

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 17.10, 18.04

Patches

🔴Vulnerability Details

5
GHSA
GHSA-3whx-jj33-9r95: hw/input/ps22022-05-13
OSV
qemu vulnerabilities2018-05-16
OSV
qemu regression2018-03-05
OSV
qemu vulnerabilities2018-02-20
OSV
CVE-2017-16845: hw/input/ps22017-11-17

📋Vendor Advisories

5
Ubuntu
QEMU vulnerabilities2018-05-16
Ubuntu
QEMU regression2018-03-05
Ubuntu
QEMU vulnerabilities2018-02-20
Red Hat
Qemu: ps2: information leakage via post_load routine2017-11-15
Debian
CVE-2017-16845: qemu - hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest ...2017

💬Community

3
Bugzilla
CVE-2017-16845 Qemu: ps2: information leakage via post_load routine2017-11-16
Bugzilla
CVE-2017-16845 xen: Qemu: ps2: information leakage via post_load routine [fedora-all]2017-11-16
Bugzilla
CVE-2017-16845 Qemu: ps2: information leakage via post_load routine [fedora-all]2017-11-16