Name | CVE-2019-14851 |
Description | A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
nbdkit (PTS) | bullseye | 1.24.1-2 | fixed |
bookworm | 1.32.5-1 | fixed | |
trixie | 1.40.2-2 | fixed | |
sid | 1.40.4-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
nbdkit | source | jessie | (not affected) | |||
nbdkit | source | stretch | (not affected) | |||
nbdkit | source | buster | (not affected) | |||
nbdkit | source | (unstable) | 1.14.2-1 |
[buster] - nbdkit <not-affected> (Issue introduced by the fix for CVE-2019-14850)
[stretch] - nbdkit <not-affected> (Issue introduced by the fix for CVE-2019-14850)
[jessie] - nbdkit <not-affected> (introduced by CVE-2019-14850)
https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html
1.15 (development branch):
https://github.com/libguestfs/nbdkit/commit/a6b88b195a959b17524d1c8353fd425d4891dc5f
1.14:
https://github.com/libguestfs/nbdkit/commit/bf0d61883a2f02f4388ec10dc92d4c61c093679e
1.12:
https://github.com/libguestfs/nbdkit/commit/b2bc6683ea3cd1f6be694e8a681dfa411b7d15f3