USN-2676-1: NBD vulnerabilities

Ubuntu Security Notice USN-2676-1

22nd July, 2015

nbd vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in NBD.

Software description

  • nbd - Network Block Device protocol

Details

It was discovered that NBD incorrectly handled IP address matching. A
remote attacker could use this issue with an IP address that has a partial
match and bypass access restrictions. This issue only affected
Ubuntu 12.04 LTS. (CVE-2013-6410)

Tuomas Räsänen discovered that NBD incorrectly handled wrong export names
and closed connections during negotiation. A remote attacker could use this
issue to cause NBD to crash, resulting in a denial of service. This issue
only affected Ubuntu 12.04 LTS. (CVE-2013-7441)

Tuomas Räsänen discovered that NBD incorrectly handled signals. A remote
attacker could use this issue to cause NBD to crash, resulting in a denial
of service. (CVE-2015-0847)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 15.04:
nbd-server 1:3.8-4ubuntu0.1
Ubuntu 14.10:
nbd-server 1:3.8-1ubuntu0.1
Ubuntu 14.04 LTS:
nbd-server 1:3.7-1ubuntu0.1
Ubuntu 12.04 LTS:
nbd-server 1:2.9.25-2ubuntu1.1

To update your system, please follow these instructions: http://ift.tt/17VXqjU.

In general, a standard system update will make all the necessary changes.

References

CVE-2013-6410, CVE-2013-7441, CVE-2015-0847



from Ubuntu Security Notices http://ift.tt/1GDkVdM