Summary: | <sys-block/nbd-2.9.20: buffer overflow (CVE-2011-0530) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Paweł Hajdan, Jr. (RETIRED) <phajdan.jr> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | base-system |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=673562 | ||
Whiteboard: | C1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Paweł Hajdan, Jr. (RETIRED)
![]() i think nbd-2.9.20 is fixed, and it's in the tree now (In reply to comment #1) > i think nbd-2.9.20 is fixed, and it's in the tree now > Great, thanks. Arches, please test and mark stable: =sys-block/nbd-2.9.20 Target keywords : "amd64 ppc ppc64 x86" amd64 done I tested on x86 but stopped "make check" after a few hours as it looks like an infinite loop!? However, the server & client seem to work nevertheless. x86 done. Thanks Andreas. I saw the same behaviour. Could you file a bug for that? ppc/ppc64 stable Thank you everyone. GLSA request filed. (In reply to comment #5) > x86 done. Thanks Andreas. I saw the same behaviour. Could you file a bug for > that? > I started it again and left it running in a screen session, 24 hours later it really finished successful! :-) CVE-2011-0530 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0530): Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. This issue was resolved and addressed in GLSA 201206-35 at http://security.gentoo.org/glsa/glsa-201206-35.xml by GLSA coordinator Stefan Behte (craig). |