1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
|
PublicDateAtUSN: 2013-12-07
Candidate: CVE-2013-6410
PublicDate: 2013-12-07
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6410
http://seclists.org/oss-sec/2013/q4/366
http://www.ubuntu.com/usn/usn-2676-1
Description:
nbd-server in Network Block Device (nbd) before 3.5 does not properly check
IP addresses, which might allow remote attackers to bypass intended access
restrictions via an IP address that has a partial match in the authfile
configuration file.
Ubuntu-Description:
Notes:
Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-6410
Priority: low
Discovered-by:
Assigned-to: mdeslaur
Patches_nbd:
vendor: http://anonscm.debian.org/cgit/users/wouter/nbd.git/commit/?id=0e9bd98c44dd94d9ede92655a36849fbc8cbf5b9
upstream: https://github.com/yoe/nbd/commit/df890c99337a255979e608d71f42401c0cddd5e0
vendor: http://www.debian.org/security/2013/dsa-2806
upstream_nbd: needs-triage
lucid_nbd: ignored (reached end-of-life)
precise_nbd: released (1:2.9.25-2ubuntu1.1)
quantal_nbd: ignored (reached end-of-life)
raring_nbd: ignored (reached end-of-life)
saucy_nbd: ignored (reached end-of-life)
trusty_nbd: not-affected (1:3.7-1)
utopic_nbd: not-affected (1:3.7-1)
vivid_nbd: not-affected (1:3.7-1)
devel_nbd: not-affected (1:3.7-1)
|