has been assigned to NBD and addressed in nbd-v2.8.3 version:
contains the issue again. This flaw was fixed second time
via upstream changeset:
i think nbd-2.9.20 is fixed, and it's in the tree now
(In reply to comment #1)
> i think nbd-2.9.20 is fixed, and it's in the tree now
Arches, please test and mark stable:
Target keywords : "amd64 ppc ppc64 x86"
I tested on x86 but stopped "make check" after a few hours as it looks like an infinite loop!?
However, the server & client seem to work nevertheless.
x86 done. Thanks Andreas. I saw the same behaviour. Could you file a bug for that?
Thank you everyone. GLSA request filed.
(In reply to comment #5)
> x86 done. Thanks Andreas. I saw the same behaviour. Could you file a bug for
I started it again and left it running in a screen session, 24 hours later it really finished successful! :-)
Buffer overflow in the mainloop function in nbd-server.c in the server in
Network Block Device (nbd) before 2.9.20 might allow remote attackers to
execute arbitrary code via a long request. NOTE: this issue exists because
of a CVE-2005-3534 regression.
This issue was resolved and addressed in
GLSA 201206-35 at http://security.gentoo.org/glsa/glsa-201206-35.xml
by GLSA coordinator Stefan Behte (craig).