Updated nbd packages fix security vulnerability
Publication date: 01 Nov 2022Modification date: 01 Nov 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-26495 , CVE-2022-26496
Description
It was discovered that nbd prior to 3.24 contained an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name resulting in a write to a dangling pointer (CVE-2022-26495). Stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name. (CVE-2022-26496) Packaging has been adjusted to create the required nbd user and group at installation.
References
- https://bugs.mageia.org/show_bug.cgi?id=30153
- https://www.debian.org/lts/security/2022/dla-2944
- https://www.debian.org/security/2022/dsa-5100
- https://ubuntu.com/security/notices/USN-5323-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/PU5JFD4PEJED72TZLZ5R2Q2SFXICU5I5/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3FXWPGNBOFA2QZOFDFNU2AZJWYEW7A/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26495
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26496
SRPMS
8/core
- nbd-3.24-1.2.mga8