First published: Sun Mar 06 2022(Updated: )
In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/nbd | <=1:3.23-3<=1:3.15.2-3 | 1:3.24-1 1:3.21-1+deb11u1 1:3.19-3+deb10u1 |
debian/nbd | 1:3.19-3+deb10u1 1:3.21-1+deb11u1 1:3.24-1.1 1:3.25-1 | |
Network Block Device Project Network Block Device | <3.24 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26495 is a vulnerability in nbd-server in nbd before version 3.24 that allows an attacker to trigger a heap-based buffer overflow through an integer overflow.
CVE-2022-26495 has a severity rating of 9.8 (Critical).
CVE-2022-26495 affects nbd-server in nbd versions before 3.24, allowing an attacker to trigger a heap-based buffer overflow.
CVE-2022-26495 affects nbd versions up to and including 3.23.
To fix CVE-2022-26495, update your nbd package to version 3.24 or higher.