Description
In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2944-1 | nbd security update |
Debian DSA |
DSA-5100-1 | nbd security update |
Ubuntu USN |
USN-5323-1 | NBD vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:03:32.903Z
Reserved: 2022-03-06T00:00:00.000Z
Link: CVE-2022-26495
No data.
Status : Modified
Published: 2022-03-06T06:15:07.303
Modified: 2024-11-21T06:54:03.353
Link: CVE-2022-26495
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN