[Libguestfs] [LIBNBD SECURITY PATCH 0/1] NBD Protocol Downgrade Attack in libnbd

Eric Blake eblake at redhat.com
Mon Sep 16 20:05:40 UTC 2019


On 9/16/19 2:06 PM, Eric Blake wrote:
> We discovered a possible Downgrade Attack in libnbd.
> 
> Lifecycle
> ---------
> 
> Reported: 2019-09-14  Fixed: 2019-09-16  Published: 2019-09-16
> 
> There is no CVE number assigned for this issue yet, but the bug is
> being categorized and processed by Red Hat's security team which may
> result in a CVE being published later.

CVE-2019-14842 has now been assigned.

-- 
Eric Blake, Principal Software Engineer
Red Hat, Inc.           +1-919-301-3226
Virtualization:  qemu.org | libvirt.org

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <http://listman.redhat.com/archives/libguestfs/attachments/20190916/bb97833d/attachment.sig>


More information about the Libguestfs mailing list