Wouter Verhelst uploaded new packages for nbd which fixed the following
security problems:
CVE-2015-0847
Tuomas Räsänen discovered that nbd-server unsafe signal handling in
nbd-server, the server for the Network Block Device protocol, could
allow remote attackers to cause a deadlock in the server process and
thus a denial of service.
CVE-2013-7441
Tuomas Räsänen discovered that the modern-style negotiation was
carried out in the main process before forking the actual client
handler. This could allow a remote attacker to cause a denial of
service (crash) by querying a non-existent export.
For the squeeze-backports distribution,the problems have been fixed in
version 1:3.2-4~deb7u5~bpo60+1.
The wheezy-backports and jessie-backports suites do not contain nbd
packages, and therefore are not vulnerable (but see DSA-3271-1).