UbuntuUpdates.org

Package "nbd"

Name: nbd

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Network Block Device protocol - server

Latest version: 1:3.20-1ubuntu0.1
Release: focal (20.04)
Level: security
Repository: main

Links



Other versions of "nbd" in Focal

Repository Area Version
base main 1:3.20-1
security universe 1:3.20-1ubuntu0.1
updates main 1:3.20-1ubuntu0.1
updates universe 1:3.20-1ubuntu0.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:3.20-1ubuntu0.1 2022-03-14 12:06:24 UTC

  nbd (1:3.20-1ubuntu0.1) focal-security; urgency=medium

  * SECURITY UPDATE: heap overflow via long name length
    - nbd-server.c: limit the size of a name length.
    - CVE-2022-26495
  * SECURITY UPDATE: buffer overflow in NBD_OPT_INFO/NBD_OPT_GO handling
    - nbd-server.c: use consume function instead of socket_read.
    - CVE-2022-26496

 -- Marc Deslauriers <email address hidden> Thu, 10 Mar 2022 08:15:12 -0500

CVE-2022-26495 In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length
CVE-2022-26496 In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by



About   -   Send Feedback to @ubuntu_updates