ALT-PU-2024-15569-3
Closed vulnerabilities
BDU:2015-01947
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01639
Уязвимость реализации сетевых блочных устройств nbd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2022-01643
Уязвимость реализации сетевых блочных устройств nbd, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2013-6410
nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.
- [nbd-general] 20131201 [Nbd] 3.5 released
- [nbd-general] 20131201 [Nbd] 3.5 released
- DSA-2806
- DSA-2806
- [oss-security] 20131129 Re: CVE request: incorrect parsing of access control file in nbd-server
- [oss-security] 20131129 Re: CVE request: incorrect parsing of access control file in nbd-server
- 64002
- 64002
- USN-2676-1
- USN-2676-1
Modified: 2024-11-21
CVE-2013-7441
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.
- openSUSE-SU-2015:0994
- openSUSE-SU-2015:0994
- [Nbd] 20130128 NBD server terminates on SIGPIPE during negotiation
- [Nbd] 20130128 NBD server terminates on SIGPIPE during negotiation
- DSA-3271
- DSA-3271
- [oss-security] 20150519 CVE Request: nbd denial of service
- [oss-security] 20150519 CVE Request: nbd denial of service
- [oss-security] 20150521 Re: CVE Request: nbd denial of service
- [oss-security] 20150521 Re: CVE Request: nbd denial of service
- 74808
- 74808
- USN-2676-1
- USN-2676-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781547
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781547
- https://github.com/yoe/nbd/commit/741495cb08503fd32a9d22648e63b64390c601f4
- https://github.com/yoe/nbd/commit/741495cb08503fd32a9d22648e63b64390c601f4
Modified: 2024-11-21
CVE-2015-0847
nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.
- openSUSE-SU-2015:0994
- openSUSE-SU-2015:0994
- [Nbd] 20150507 [PATCH] nbd-server: fix unsafe signal handling
- [Nbd] 20150507 [PATCH] nbd-server: fix unsafe signal handling
- http://sourceforge.net/projects/nbd/files/nbd/3.11/
- http://sourceforge.net/projects/nbd/files/nbd/3.11/
- DSA-3271
- DSA-3271
- [oss-security] 20150507 CVE-2015-0847 in nbd-server
- [oss-security] 20150507 CVE-2015-0847 in nbd-server
- USN-2676-1
- USN-2676-1
Modified: 2024-11-21
CVE-2022-26495
In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.
- [debian-lts-announce] 20220310 [SECURITY] [DLA 2944-1] nbd security update
- [debian-lts-announce] 20220310 [SECURITY] [DLA 2944-1] nbd security update
- https://lists.debian.org/nbd/2022/01/msg00037.html
- https://lists.debian.org/nbd/2022/01/msg00037.html
- FEDORA-2022-263873fb70
- FEDORA-2022-263873fb70
- FEDORA-2022-62adf9a1e0
- FEDORA-2022-62adf9a1e0
- FEDORA-2022-807e431d5f
- FEDORA-2022-807e431d5f
- GLSA-202402-10
- GLSA-202402-10
- https://sourceforge.net/projects/nbd/files/nbd/
- https://sourceforge.net/projects/nbd/files/nbd/
- DSA-5100
- DSA-5100
Modified: 2024-11-21
CVE-2022-26496
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
- http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html
- http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html
- https://lists.debian.org/nbd/2022/01/msg00036.html
- https://lists.debian.org/nbd/2022/01/msg00036.html
- https://lists.debian.org/nbd/2022/01/msg00037.html
- https://lists.debian.org/nbd/2022/01/msg00037.html
- FEDORA-2022-263873fb70
- FEDORA-2022-263873fb70
- FEDORA-2022-62adf9a1e0
- FEDORA-2022-62adf9a1e0
- FEDORA-2022-807e431d5f
- FEDORA-2022-807e431d5f
- GLSA-202402-10
- GLSA-202402-10
- https://sourceforge.net/projects/nbd/files/nbd/
- https://sourceforge.net/projects/nbd/files/nbd/
- DSA-5100
- DSA-5100
Closed bugs
Не стартует nbd-server с помощью systemd