Debian Libnbd vulnerabilities
7 known vulnerabilities affecting debian/libnbd.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM2LOW3
Vulnerabilities
Page 1 of 1
CVE-2025-14946LOWCVSS 4.8fixed in libnbd 1.22.5-1 (forky)2025
CVE-2025-14946 [MEDIUM] CVE-2025-14946: libnbd - A flaw was found in libnbd. A malicious actor could exploit this by convincing l...
A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execut
debian
CVE-2024-7383HIGHCVSS 7.4fixed in libnbd 1.20.2-1 (forky)2024
CVE-2024-7383 [HIGH] CVE-2024-7383: libnbd - A flaw was found in libnbd. The client did not always correctly verify the NBD s...
A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1.20.2-1)
sid: resolved (fixed in 1.20.2-1)
trixie: resolved (fixed in 1.20.2-1)
debian
CVE-2023-5215MEDIUMCVSS 5.3fixed in libnbd 1.16.5-1 (forky)2023
CVE-2023-5215 [MEDIUM] CVE-2023-5215: libnbd - A flaw was found in libnbd. A server can reply with a block size larger than 2^6...
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
Scope: local
bookworm: open
bullseye: open
forky: resolved
debian
CVE-2023-5871LOWCVSS 5.3fixed in libnbd 1.18.1-1 (forky)2023
CVE-2023-5871 [MEDIUM] CVE-2023-5871: libnbd - A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a pro...
A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 1.18.1-1)
sid: resolved (fixed in 1.18.1-1)
trixie: resolved (fixed i
debian
CVE-2022-0485MEDIUMCVSS 4.8fixed in libnbd 1.10.5-1 (bookworm)2022
CVE-2022-0485 [MEDIUM] CVE-2022-0485: libnbd - A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-...
A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This could result in the silent creation of a corrupted destination image.
Scope: local
bookworm: resolved (fixed
debian
CVE-2021-20286LOWCVSS 2.7fixed in libnbd 1.6.2-1 (bookworm)2021
CVE-2021-20286 [LOW] CVE-2021-20286: libnbd - A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in...
A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service.
Scope: local
bookworm: resolved (fixed in 1.6.2-1)
bullseye: open
forky: resolved (fixed in 1.6.2-1)
sid: resolved (fixed in 1.6.2-1)
trixie: resolved (fixed in 1.6.2-1)
debian
CVE-2019-14842CRITICALCVSS 9.8fixed in libnbd 1.0.3-1 (bookworm)2019
CVE-2019-14842 [CRITICAL] CVE-2019-14842: libnbd - Structured reply is a feature of the newstyle NBD protocol allowing the server t...
Structured reply is a feature of the newstyle NBD protocol allowing the server to send a reply in chunks. A bounds check which was supposed to test for chunk offsets smaller than the beginning of the request did not work because of signed/unsigned confusion. If one of these chunks contains a negative offset then data under control of the server is written to memo
debian