Wouter Verhelst uploaded new packages for nbd which fixed the following security problems: CVE-2015-0847 Tuomas Räsänen discovered that nbd-server unsafe signal handling in nbd-server, the server for the Network Block Device protocol, could allow remote attackers to cause a deadlock in the server process and thus a denial of service. CVE-2013-7441 Tuomas Räsänen discovered that the modern-style negotiation was carried out in the main process before forking the actual client handler. This could allow a remote attacker to cause a denial of service (crash) by querying a non-existent export. For the squeeze-backports distribution,the problems have been fixed in version 1:3.2-4~deb7u5~bpo60+1. The wheezy-backports and jessie-backports suites do not contain nbd packages, and therefore are not vulnerable (but see DSA-3271-1).