Total vulnerabilities in the database
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
Software | From | Fixed in |
---|---|---|
nbdkit_project / nbdkit | 1.27.1 | 1.27.6 |
nbdkit_project / nbdkit | 1.25.1 | 1.26.5 |
nbdkit_project / nbdkit | 1.11.8 | 1.24.6 |
redhat / enterprise_linux | 8.0 | 8.0.x |