|Summary:||<sys-block/nbd-2.9.20: buffer overflow (CVE-2011-0530)|
|Product:||Gentoo Security||Reporter:||Paweł Hajdan, Jr. (RETIRED) <phajdan.jr>|
|Component:||Vulnerabilities||Assignee:||Gentoo Security <security>|
|Package list:||Runtime testing required:||---|
Description Paweł Hajdan, Jr. (RETIRED) 2011-01-28 21:32:28 UTC
Originally, CVE-2005-3534:  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3534 has been assigned to NBD and addressed in nbd-v2.8.3 version:  http://sourceforge.net/project/shownotes.php?release_id=380202&group_id=13229 via changeset:  https://github.com/yoe/nbd/commit/4ed24fe0d64c7cc9963c57b52cad1555ad7c6b60 But nbd-v2.9.0:  http://sourceforge.net/projects/nbd/files/nbd/2.9.0/ contains the issue again. This flaw was fixed second time via upstream changeset:  https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 References:  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187 https://bugzilla.redhat.com/show_bug.cgi?id=673562
Comment 1 SpanKY 2011-03-01 01:52:43 UTC
i think nbd-2.9.20 is fixed, and it's in the tree now
Comment 2 Tim Sammut (RETIRED) 2011-03-01 03:48:26 UTC
(In reply to comment #1) > i think nbd-2.9.20 is fixed, and it's in the tree now > Great, thanks. Arches, please test and mark stable: =sys-block/nbd-2.9.20 Target keywords : "amd64 ppc ppc64 x86"
Comment 3 Markos Chandras (RETIRED) 2011-03-01 08:46:19 UTC
Comment 4 Andreas Schürch 2011-03-02 07:53:55 UTC
I tested on x86 but stopped "make check" after a few hours as it looks like an infinite loop!? However, the server & client seem to work nevertheless.
Comment 5 Thomas Kahle (RETIRED) 2011-03-02 08:02:57 UTC
x86 done. Thanks Andreas. I saw the same behaviour. Could you file a bug for that?
Comment 6 Kacper Kowalik (Xarthisius) (RETIRED) 2011-03-02 08:25:33 UTC
Comment 7 Tim Sammut (RETIRED) 2011-03-03 07:07:37 UTC
Thank you everyone. GLSA request filed.
Comment 8 Andreas Schürch 2011-03-04 05:49:06 UTC
(In reply to comment #5) > x86 done. Thanks Andreas. I saw the same behaviour. Could you file a bug for > that? > I started it again and left it running in a screen session, 24 hours later it really finished successful! :-)
Comment 9 GLSAMaker/CVETool Bot 2011-06-24 00:30:18 UTC
CVE-2011-0530 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0530): Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
Comment 10 GLSAMaker/CVETool Bot 2012-06-25 19:23:21 UTC
This issue was resolved and addressed in GLSA 201206-35 at http://security.gentoo.org/glsa/glsa-201206-35.xml by GLSA coordinator Stefan Behte (craig).