Source: open-iscsi Version: 2.0.873+git0.3b4b4500-8 Severity: important Tags: patch security upstream Forwarded: https://github.com/open-iscsi/open-iscsi/pull/72
Hi, the following vulnerability was published for open-iscsi, whilest only "one" of the issues from the qualys report has a CVE, cf. [1], all fixes from [2] should preferably be applied. Cf. as well [3]. CVE-2017-17840[0]: | An issue was discovered in Open-iSCSI through 2.0.875. A local attacker | can cause the iscsiuio server to abort or potentially execute code by | sending messages with incorrect lengths, which (due to lack of | checking) can lead to buffer overflows, and result in aborts (with | overflow checking enabled) or code execution. The | process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c | does not validate the payload length before a write operation. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-17840 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17840 [1] http://www.openwall.com/lists/oss-security/2017/12/13/2 [2] https://github.com/open-iscsi/open-iscsi/pull/72 [3] https://bugzilla.opensuse.org/show_bug.cgi?id=1072312 Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team