In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBDOPTINFO or NBDOPTGO message with an large value as the length of the name.
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.16.2-1ubuntu0.2" }, { "binary_name": "nbd-client-dbgsym", "binary_version": "1:3.16.2-1ubuntu0.2" }, { "binary_name": "nbd-client-udeb", "binary_version": "1:3.16.2-1ubuntu0.2" }, { "binary_name": "nbd-server", "binary_version": "1:3.16.2-1ubuntu0.2" }, { "binary_name": "nbd-server-dbgsym", "binary_version": "1:3.16.2-1ubuntu0.2" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.20-1ubuntu0.1" }, { "binary_name": "nbd-client-dbgsym", "binary_version": "1:3.20-1ubuntu0.1" }, { "binary_name": "nbd-client-udeb", "binary_version": "1:3.20-1ubuntu0.1" }, { "binary_name": "nbd-server", "binary_version": "1:3.20-1ubuntu0.1" }, { "binary_name": "nbd-server-dbgsym", "binary_version": "1:3.20-1ubuntu0.1" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.23-3ubuntu1" }, { "binary_name": "nbd-client-dbgsym", "binary_version": "1:3.23-3ubuntu1" }, { "binary_name": "nbd-server", "binary_version": "1:3.23-3ubuntu1" }, { "binary_name": "nbd-server-dbgsym", "binary_version": "1:3.23-3ubuntu1" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }