CVE-2021-3716

NameCVE-2021-3716
DescriptionA flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nbdkit (PTS)buster1.10.3-1fixed
bullseye1.24.1-2vulnerable
bookworm1.32.5-1fixed
trixie1.36.3-1fixed
sid1.38.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nbdkitsourcestretch(not affected)
nbdkitsourcebuster(not affected)
nbdkitsource(unstable)1.26.5-1

Notes

[bullseye] - nbdkit <no-dsa> (Minor issue)
[buster] - nbdkit <not-affected> (Vulnerable code introduced later)
[stretch] - nbdkit <not-affected> (Vulnerable code introduced later)
Introduced by: https://github.com/libguestfs/nbdkit/commit/eaa4c6e9a2c4bdb71aefdd4b1d865e7a9af606a8 (v1.11.8)
https://listman.redhat.com/archives/libguestfs/2021-August/msg00077.html

Search for package or bug name: Reporting problems