In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2022/03/msg00014.html | Mailing List Third Party Advisory |
https://lists.debian.org/nbd/2022/01/msg00037.html | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2UPX62BIWOOHSACGUDB7E3O4URNN37F/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZHR73XMAJTCFGKUZRXVTZKCK2X3IFNA/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU5JFD4PEJED72TZLZ5R2Q2SFXICU5I5/ | |
https://security.gentoo.org/glsa/202402-10 | |
https://sourceforge.net/projects/nbd/files/nbd/ | Product Release Notes Third Party Advisory |
https://www.debian.org/security/2022/dsa-5100 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-06T00:00:00
Updated: 2024-02-04T11:06:25.543428
Reserved: 2022-03-06T00:00:00
Link: CVE-2022-26495
JSON object: View
NVD Information
Status : Modified
Published: 2022-03-06T06:15:07.303
Modified: 2024-02-04T11:15:08.227
Link: CVE-2022-26495
JSON object: View
Redhat Information
No data.
CWE