[Libguestfs] [libnbd PATCH v2 5/5] copy: CVE-2022-0485: Fail nbdcopy if NBD read or write fails
Eric Blake
eblake at redhat.com
Fri Feb 4 14:44:00 UTC 2022
On Fri, Feb 04, 2022 at 10:09:26AM +0100, Laszlo Ersek wrote:
> On 02/03/22 21:25, Eric Blake wrote:
> > nbdcopy has a nasty bug when performing multi-threaded copies using
> > asynchronous nbd calls - it was blindly treating the completion of an
> > asynchronous command as successful, rather than checking the *error
> > parameter. This can result in the silent creation of a corrupted
> > image in two different ways: when a read fails, we blindly wrote
> > garbage to the destination; when a write fails, we did not flag that
> > the destination was not written.
> >
> > + /* XXX - is it worth retrying a failed command? */
> > + if (*error) {
> > + fprintf (stderr, "read at offset 0x%" PRIx64 "failed: %s\n",
>
> Like Nir said, it should be '" failed..."'. (I'm neutral on PRIx64 vs.
> PRIu64.)
>
> Reviewed-by: Laszlo Ersek <lersek at redhat.com>
>
> Thanks
> Laszlo
Now pushed upstream as a865526..8d444b4, with tweaks to patches 1 and
5 content and patch 4 commit message per review comments.
I'm starting the backport process to stable branches, and will
followup with a top-level post as the security announcement (although
given my schedule today, the announcement may be delayed to Monday).
--
Eric Blake, Principal Software Engineer
Red Hat, Inc. +1-919-301-3266
Virtualization: qemu.org | libvirt.org
More information about the Libguestfs
mailing list