CVE-2022-26495

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-26495
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-26495.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-26495
Downstream
Related
Published
2022-03-06T06:15:07Z
Modified
2025-09-19T13:48:47.393821Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBDOPTINFO, NBDOPTGO, and NBDOPTEXPORT_NAME messages.

References

Affected packages

Git / github.com/networkblockdevice/nbd

Affected ranges

Type
GIT
Repo
https://github.com/networkblockdevice/nbd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.9.0
2.9.1
2.9.10
2.9.11
2.9.12
2.9.13
2.9.14
2.9.15
2.9.16
2.9.17
2.9.18
2.9.19
2.9.2
2.9.20
2.9.21
2.9.21a
2.9.3
2.9.6
2.9.7
2.9.8

git-2.*

git-2.9.12
git-2.9.13
git-2.9.14

nbd-2.*

nbd-2.9.22
nbd-2.9.23
nbd-2.9.24
nbd-2.9.25

nbd-3.*

nbd-3.0
nbd-3.1
nbd-3.1.1
nbd-3.10
nbd-3.11
nbd-3.12
nbd-3.12.1
nbd-3.12pre1
nbd-3.13
nbd-3.14
nbd-3.15
nbd-3.15.1
nbd-3.15.2
nbd-3.16
nbd-3.16.1
nbd-3.16.2
nbd-3.17
nbd-3.18
nbd-3.19
nbd-3.2
nbd-3.20
nbd-3.21
nbd-3.22
nbd-3.23
nbd-3.3
nbd-3.4
nbd-3.5
nbd-3.6
nbd-3.7
nbd-3.8
nbd-3.9
nbd-3.9.1