[Pkg-iscsi-maintainers] Bug#885021: open-iscsi: CVE-2017-17840: buffer overflow in process_iscsid_broadcast()

Salvatore Bonaccorso carnil at debian.org
Fri Dec 22 22:37:39 UTC 2017


Source: open-iscsi
Version: 2.0.873+git0.3b4b4500-8
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/open-iscsi/open-iscsi/pull/72

Hi,

the following vulnerability was published for open-iscsi, whilest only
"one" of the issues from the qualys report has a CVE, cf. [1], all
fixes from [2] should preferably be applied. Cf. as well [3].

CVE-2017-17840[0]:
| An issue was discovered in Open-iSCSI through 2.0.875. A local attacker
| can cause the iscsiuio server to abort or potentially execute code by
| sending messages with incorrect lengths, which (due to lack of
| checking) can lead to buffer overflows, and result in aborts (with
| overflow checking enabled) or code execution. The
| process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c
| does not validate the payload length before a write operation.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-17840
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17840
[1] http://www.openwall.com/lists/oss-security/2017/12/13/2
[2] https://github.com/open-iscsi/open-iscsi/pull/72
[3] https://bugzilla.opensuse.org/show_bug.cgi?id=1072312

Regards,
Salvatore



More information about the Pkg-iscsi-maintainers mailing list