Critical severity10.0NVD Advisory· Published Nov 17, 2017· Updated May 13, 2026
CVE-2017-16845
CVE-2017-16845
Description
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
Affected products
7cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.htmlnvdMailing ListPatchThird Party Advisory
- www.securityfocus.com/bid/101923nvdThird Party AdvisoryVDB Entry
- lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlnvdMailing ListThird Party Advisory
- usn.ubuntu.com/3575-1/nvdThird Party Advisory
- usn.ubuntu.com/3649-1/nvdThird Party Advisory
- www.debian.org/security/2018/dsa-4213nvdThird Party Advisory
News mentions
0No linked articles in our index yet.