ALT-PU-2020-3187-1
Closed vulnerabilities
BDU:2015-01947
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-6410
nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.
- http://sourceforge.net/mailarchive/forum.php?thread_name=529BAA58.2080401%40uter.be&forum_name=nbd-general
- http://www.debian.org/security/2013/dsa-2806
- http://www.openwall.com/lists/oss-security/2013/11/29/4
- http://www.securityfocus.com/bid/64002
- http://www.ubuntu.com/usn/USN-2676-1
- http://sourceforge.net/mailarchive/forum.php?thread_name=529BAA58.2080401%40uter.be&forum_name=nbd-general
- http://www.debian.org/security/2013/dsa-2806
- http://www.openwall.com/lists/oss-security/2013/11/29/4
- http://www.securityfocus.com/bid/64002
- http://www.ubuntu.com/usn/USN-2676-1
Modified: 2025-04-12
CVE-2013-7441
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00003.html
- http://sourceforge.net/p/nbd/mailman/message/30410146/
- http://www.debian.org/security/2015/dsa-3271
- http://www.openwall.com/lists/oss-security/2015/05/19/6
- http://www.openwall.com/lists/oss-security/2015/05/21/5
- http://www.securityfocus.com/bid/74808
- http://www.ubuntu.com/usn/USN-2676-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781547
- https://github.com/yoe/nbd/commit/741495cb08503fd32a9d22648e63b64390c601f4
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00003.html
- http://sourceforge.net/p/nbd/mailman/message/30410146/
- http://www.debian.org/security/2015/dsa-3271
- http://www.openwall.com/lists/oss-security/2015/05/19/6
- http://www.openwall.com/lists/oss-security/2015/05/21/5
- http://www.securityfocus.com/bid/74808
- http://www.ubuntu.com/usn/USN-2676-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781547
- https://github.com/yoe/nbd/commit/741495cb08503fd32a9d22648e63b64390c601f4
Modified: 2025-04-12
CVE-2015-0847
nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00003.html
- http://sourceforge.net/p/nbd/mailman/message/34091218/
- http://sourceforge.net/projects/nbd/files/nbd/3.11/
- http://www.debian.org/security/2015/dsa-3271
- http://www.openwall.com/lists/oss-security/2015/05/07/9
- http://www.ubuntu.com/usn/USN-2676-1
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00003.html
- http://sourceforge.net/p/nbd/mailman/message/34091218/
- http://sourceforge.net/projects/nbd/files/nbd/3.11/
- http://www.debian.org/security/2015/dsa-3271
- http://www.openwall.com/lists/oss-security/2015/05/07/9
- http://www.ubuntu.com/usn/USN-2676-1