|
|
Message-ID: <nycvar.YSQ.7.77.849.2006091051520.30592@xnncv>
Date: Tue, 9 Jun 2020 10:58:08 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
cc: Eric Blake <eblake@...hat.com>, Xueqiang Wei <xuwei@...hat.com>
Subject: CVE-2020-10761 QEMU: nbd: reachable assertion failure
innbd_negotiate_send_rep_verr via remote client
Hello,
Quick Emulator(Qemu) built with the Network Block Device(NBD) Server support
is vulnerable to a crash via assertion failure. It could occur when a
nbd-client sends a spec-compliant request that is near the boundary of the
maximum permitted length. A remote user/process could use this flaw to crash
the qemu-nbd server resulting in DoS.
Upstream patch:
---------------
-> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg02031.html
Issue introduced since QEMU v4.2
-> https://git.qemu.org/?p=qemu.git;a=commit;h=93676c88d7a5cd5971de94f9091eff8e9773b1af
server:
- Adjust things to allow full 4k name limit rather than previous 256 byte
limit
- It allowed nbd-client to send longer (>256 bytes) export names
This issue was reported by Eric Blake and Xueqiang Wei of Red Hat Inc.
Thank you.
--
Prasad J Pandit / Red Hat Product Security Team
8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.