MGASA-2022-0403

Source
https://advisories.mageia.org/MGASA-2022-0403.html
Import Source
https://advisories.mageia.org/MGASA-2022-0403.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0403
Related
Published
2022-11-01T22:58:59Z
Modified
2022-11-01T22:02:18Z
Summary
Updated nbd packages fix security vulnerability
Details

It was discovered that nbd prior to 3.24 contained an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name resulting in a write to a dangling pointer (CVE-2022-26495).

Stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBDOPTINFO or NBDOPTGO message with an large value as the length of the name. (CVE-2022-26496)

Packaging has been adjusted to create the required nbd user and group at installation.

References
Credits

Affected packages