Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 12 Jan 2021 19:10:07 +0000
From: John Haxby <john.haxby@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2020-28374: Linux SCSI target (LIO)
 unrestricted copy offload



> On 12 Jan 2021, at 18:01, David Disseldorp <ddiss@...e.de> wrote:
> 
> ===============================================================================
> == Subject:     Linux SCSI target (LIO) unrestricted copy offload
> ==
> ==
> == CVE ID#:     CVE-2020-28374
> ==
> == Versions:    Linux: v3.12 and later
> ==              tcmu-runner: v1.3.0 and later
> ==
> == Summary:     An attacker with access to a LUN and knowledge of Unit Serial
> ==              Number assignments can read and write to any LIO backstore,
> ==              regardless of SCSI transport settings.
> ===============================================================================
> 

David -- did you mean to attach the patches you posted to linux-distros?

jch

Download attachment "signature.asc" of type "application/pgp-signature" (269 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.