CVE-2013-6410
Published: 7 December 2013
nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.
Priority
Status
Package | Release | Status |
---|---|---|
nbd Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(1:2.9.25-2ubuntu1.1)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Not vulnerable
(1:3.7-1)
|
|
upstream |
Needs triage
|
|
utopic |
Not vulnerable
(1:3.7-1)
|
|
vivid |
Not vulnerable
(1:3.7-1)
|
|
Patches: vendor: http://anonscm.debian.org/cgit/users/wouter/nbd.git/commit/?id=0e9bd98c44dd94d9ede92655a36849fbc8cbf5b9 upstream: https://github.com/yoe/nbd/commit/df890c99337a255979e608d71f42401c0cddd5e0 vendor: http://www.debian.org/security/2013/dsa-2806 |