First published: Fri May 29 2015(Updated: )
nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/nbd | 1:3.19-3+deb10u1 1:3.21-1+deb11u1 1:3.24-1.1 1:3.25-1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
wouter verhelst nbd | <=3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0847 is classified as a medium severity vulnerability due to the potential for denial of service.
To fix CVE-2015-0847, upgrade your Network Block Device to version 3.11 or later.
CVE-2015-0847 affects nbd-server versions up to and including 3.10 and several older Ubuntu Linux versions.
Yes, CVE-2015-0847 can be exploited remotely, allowing attackers to trigger a denial of service condition.
The impact of CVE-2015-0847 can result in a deadlock situation, which can significantly degrade system performance.