A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu allowing client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, allowing to cause out-of-bounds stack write in qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/11/28/8
Acknowledgments: Name: Eric Blake (Red Hat)
Created attachment 1358264 [details] Proposed patch
Issue was introduced by commit: https://git.qemu.org/?p=qemu.git;a=commit;h=f37708f6b8 (qemu 2.10)
Created qemu tracking bugs for this issue: Affects: epel-7 [bug 1518236] Affects: fedora-all [bug 1518235]
This issue has been addressed in the following products: Red Hat Virtualization 4 for RHEL-7 Via RHSA-2018:1104 https://access.redhat.com/errata/RHSA-2018:1104