nbd-server.c in Network Block Device (nbd-server) 2.9.21 allows remote
attackers to cause a denial of service (NULL pointer dereference and crash)
by causing a negotiation failure, as demonstrated by specifying a name for a
Is 2.9.22 ok to go stable?
(In reply to comment #1)
> that's fine
Arches, please test and mark stable:
Target keywords : "amd64 ppc ppc64 x86"
ppc stable, last arch done
Thanks, folks. GLSA Vote: Yes.
Vote: YES. Added to pending GLSA request.
This issue was resolved and addressed in
GLSA 201206-35 at http://security.gentoo.org/glsa/glsa-201206-35.xml
by GLSA coordinator Stefan Behte (craig).