[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3271-1 nbd -- nbd

ID: oval:org.secpod.oval:def:602117Date: (C)2015-06-04   (M)2022-09-09
Class: PATCHFamily: unix




Tuomas Räsänen discovered that unsafe signal handling in nbd-server, the server for the Network Block Device protocol, could allow remote attackers to cause a deadlock in the server process and thus a denial of service. Tuomas Räsänen also discovered that the modern-style negotiation was carried out in the main server process before forking the actual client handler. This could allow a remote attacker to cause a denial of service by querying a non-existent export. This issue only affected the oldstable distribution .

Platform:
Debian 8.x
Debian 7.x
Product:
nbd-client
nbd-server
Reference:
DSA-3271-1
CVE-2013-7441
CVE-2015-0847
CVE    2
CVE-2013-7441
CVE-2015-0847
CPE    4
cpe:/a:wouter_verhelst:nbd-server
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x
cpe:/a:wouter_verhelst:nbd-client
...

© SecPod Technologies