DEBIAN-CVE-2022-26495

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2022-26495
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-26495.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-26495
Upstream
Published
2022-03-06T06:15:07Z
Modified
2025-09-19T07:32:15.605639Z
Summary
[none]
Details

In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBDOPTINFO, NBDOPTGO, and NBDOPTEXPORT_NAME messages.

References

Affected packages

Debian:11 / nbd

Package

Name
nbd
Purl
pkg:deb/debian/nbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.21-1+deb11u1

Affected versions

1:3.*

1:3.21-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / nbd

Package

Name
nbd
Purl
pkg:deb/debian/nbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.24-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / nbd

Package

Name
nbd
Purl
pkg:deb/debian/nbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.24-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / nbd

Package

Name
nbd
Purl
pkg:deb/debian/nbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.24-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}