Debian Security Advisory DSA 924-1 (nbd)

Summary
The remote host is missing an update to nbd announced via advisory DSA 924-1. Kurt Fitzner discovered a buffer overflow in nbd, the network block device client and server that could potentially allow arbitrary cod on the NBD server. For the old stable distribution (woody) this problem has been fixed in version 1.2cvs20020320-3.woody.3.
Solution
For the stable distribution (sarge) this problem has been fixed in version 2.7.3-3sarge1. For the unstable distribution (sid) this problem will be fixed soon. We recommend that you upgrade your nbd-server package. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20924-1