Description
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5100-1 | nbd security update |
Ubuntu USN |
USN-5323-1 | NBD vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:03:32.965Z
Reserved: 2022-03-06T00:00:00.000Z
Link: CVE-2022-26496
No data.
Status : Modified
Published: 2022-03-06T06:15:07.357
Modified: 2024-11-21T06:54:03.520
Link: CVE-2022-26496
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN