CVE-2020-10761

Name
CVE-2020-10761
Description
An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761
Mailing List https://www.openwall.com/lists/oss-security/2020/06/09/1
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html
CONFIRM https://security.netapp.com/advisory/ntap-20200731-0001/
UBUNTU https://usn.ubuntu.com/4467-1/
GENTOO https://security.gentoo.org/glsa/202011-09

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= None < 5.0.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.10-main 4.0.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable