[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [DSA 924-1] New nbd packages fix potential arbitrary code execution



<tongue location="cheek">
On Wed, Dec 21, 2005 at 03:05:01PM +0100, Martin Schulze wrote:
> Kurt Fitzner discovered a buffer overflow in nbd, the network block
> device client and server that could potentially allow arbitrary cod on
> the NBD server.

Do penguins eat cod, or just herring?  Personally, I consider this a major
security flaw, as I prefer rational fish on my NBD servers (and in fact all
of my servers).

- Matt
</tongue>



Reply to: