~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
PublicDateAtUSN: 2013-12-07
Candidate: CVE-2013-6410
PublicDate: 2013-12-07
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6410
 http://seclists.org/oss-sec/2013/q4/366
 http://www.ubuntu.com/usn/usn-2676-1
Description:
 nbd-server in Network Block Device (nbd) before 3.5 does not properly check
 IP addresses, which might allow remote attackers to bypass intended access
 restrictions via an IP address that has a partial match in the authfile
 configuration file.
Ubuntu-Description:
Notes:
Bugs:
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-6410
Priority: low
Discovered-by:
Assigned-to: mdeslaur

Patches_nbd:
 vendor: http://anonscm.debian.org/cgit/users/wouter/nbd.git/commit/?id=0e9bd98c44dd94d9ede92655a36849fbc8cbf5b9
 upstream: https://github.com/yoe/nbd/commit/df890c99337a255979e608d71f42401c0cddd5e0
 vendor: http://www.debian.org/security/2013/dsa-2806
upstream_nbd: needs-triage
lucid_nbd: ignored (reached end-of-life)
precise_nbd: released (1:2.9.25-2ubuntu1.1)
quantal_nbd: ignored (reached end-of-life)
raring_nbd: ignored (reached end-of-life)
saucy_nbd: ignored (reached end-of-life)
trusty_nbd: not-affected (1:3.7-1)
utopic_nbd: not-affected (1:3.7-1)
vivid_nbd: not-affected (1:3.7-1)
devel_nbd: not-affected (1:3.7-1)