The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:1681 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2017/06/12/1 | patch mailing list third party advisory |
https://access.redhat.com/errata/RHSA-2017:1682 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/99011 | third party advisory vdb entry |
https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg06240.html | patch mailing list third party advisory |
https://access.redhat.com/errata/RHSA-2017:2408 | third party advisory vendor advisory |
http://www.debian.org/security/2017/dsa-3925 | third party advisory vendor advisory |
https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02321.html | patch mailing list third party advisory |