Vulnerability CVE-2020-10761: Information

Description

An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.

Severity: MEDIUM (5.0) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L

Published: June 9, 2020
Modified: Nov. 7, 2023
Error type identifier: CWE-617

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
qemusisyphus5.1.0-alt18.2.2-alt3ALT-PU-2020-2595-1256281Fixed
qemusisyphus_e2k7.2.0-alt3.E2K.37.2.0-alt3.E2K.4ALT-PU-2024-1953-1-Fixed
qemup105.1.0-alt18.2.2-alt0.p10.1ALT-PU-2020-2595-1256281Fixed
qemup10_e2k7.2.0-alt3.E2K.07.2.0-alt3.E2K.3ALT-PU-2023-6766-1-Fixed
qemup94.2.1-alt15.2.0-alt6ALT-PU-2020-2431-1254589Fixed
qemuc10f15.1.0-alt18.0.4-alt1.p10ALT-PU-2020-2595-1256281Fixed
qemuc9f25.2.0-alt65.2.0-alt6.c9.1ALT-PU-2021-1964-1273330Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761
  • Issue Tracking
  • Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/06/09/1
  • Mailing List
  • Patch
  • Third Party Advisory
openSUSE-SU-2020:1108
  • Mailing List
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20200731-0001/
  • Third Party Advisory
USN-4467-1
  • Third Party Advisory
GLSA-202011-09
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
      End excliding
      5.0.1

      Configuration 2

      cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*

      Configuration 3

      cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*