Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <837a9c7055b76fa0887a07a13f7ae077c8c39387.camel@apache.org>
Date: Wed, 09 Dec 2020 08:08:48 -0800
From: Brennan Ashton <btashton@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2020-17529: Apache NuttX (incubating) Out of Bound Write from
 invalid fragmentation offset value specified in the IP header

Description:
Out-of-bounds Write vulnerability in TCP Stack of Apache Software
Foundation Apache NuttX (incubating) allows attacker to corrupt memory
by supplying and invalid fragmentation offset value specified in the IP
header.  This is only impacts builds with both CONFIG_EXPERIMENTAL and
CONFIG_NET_TCP_REASSEMBLY build flags enabled.

This issue affects:
Apache Software Foundation Apache NuttX (incubating) versions prior to
9.1.1 AND 10.0.0.

This issue is also known as AMNESIA:33 CVE-2020-17438

Credit:
Apache NuttX would like to thank Forescout for reporting the issue

Thanks you,
Brennan Ashton

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.