In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBDOPTINFO or NBDOPTGO message with an large value as the length of the name.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:3.16.2-1ubuntu0.2", "binary_name": "nbd-client" }, { "binary_version": "1:3.16.2-1ubuntu0.2", "binary_name": "nbd-client-dbgsym" }, { "binary_version": "1:3.16.2-1ubuntu0.2", "binary_name": "nbd-client-udeb" }, { "binary_version": "1:3.16.2-1ubuntu0.2", "binary_name": "nbd-server" }, { "binary_version": "1:3.16.2-1ubuntu0.2", "binary_name": "nbd-server-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:3.20-1ubuntu0.1", "binary_name": "nbd-client" }, { "binary_version": "1:3.20-1ubuntu0.1", "binary_name": "nbd-client-dbgsym" }, { "binary_version": "1:3.20-1ubuntu0.1", "binary_name": "nbd-client-udeb" }, { "binary_version": "1:3.20-1ubuntu0.1", "binary_name": "nbd-server" }, { "binary_version": "1:3.20-1ubuntu0.1", "binary_name": "nbd-server-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:3.23-3ubuntu1", "binary_name": "nbd-client" }, { "binary_version": "1:3.23-3ubuntu1", "binary_name": "nbd-client-dbgsym" }, { "binary_version": "1:3.23-3ubuntu1", "binary_name": "nbd-server" }, { "binary_version": "1:3.23-3ubuntu1", "binary_name": "nbd-server-dbgsym" } ] }