MGASA-2022-0403

Source
https://advisories.mageia.org/MGASA-2022-0403.html
Import Source
https://advisories.mageia.org/MGASA-2022-0403.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0403
Related
Published
2022-11-01T22:58:59Z
Modified
2022-11-01T22:02:18Z
Summary
Updated nbd packages fix security vulnerability
Details

It was discovered that nbd prior to 3.24 contained an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name resulting in a write to a dangling pointer (CVE-2022-26495).

Stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBDOPTINFO or NBDOPTGO message with an large value as the length of the name. (CVE-2022-26496)

Packaging has been adjusted to create the required nbd user and group at installation.

References
Credits

Affected packages

Mageia:8 / nbd

Package

Name
nbd
Purl
pkg:rpm/mageia/nbd?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.24-1.2.mga8

Ecosystem specific

{
    "section": "core"
}