In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBDOPTINFO or NBDOPTGO message with an large value as the length of the name.
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.7-1ubuntu0.1" }, { "binary_name": "nbd-server", "binary_version": "1:3.7-1ubuntu0.1" } ] }
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.13-1" }, { "binary_name": "nbd-server", "binary_version": "1:3.13-1" } ] }
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.16.2-1ubuntu0.2" }, { "binary_name": "nbd-server", "binary_version": "1:3.16.2-1ubuntu0.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.20-1ubuntu0.1" }, { "binary_name": "nbd-server", "binary_version": "1:3.20-1ubuntu0.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "nbd-client", "binary_version": "1:3.23-3ubuntu1" }, { "binary_name": "nbd-server", "binary_version": "1:3.23-3ubuntu1" } ], "availability": "No subscription required" }