Mageia 2022-0403: nbd security update | LinuxSecurity.com
MGASA-2022-0403 - Updated nbd packages fix security vulnerability

Publication date: 01 Nov 2022
URL: https://advisories.mageia.org/MGASA-2022-0403.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-26495,
     CVE-2022-26496

It was discovered that nbd prior to 3.24 contained an integer overflow
with a resultant heap-based buffer overflow. A value of 0xffffffff in the
name length field will cause a zero-sized buffer to be allocated for the
name resulting in a write to a dangling pointer (CVE-2022-26495).

Stack-based buffer overflow. An attacker can cause a buffer overflow in
the parsing of the name field by sending a crafted NBD_OPT_INFO or
NBD_OPT_GO message with an large value as the length of the name.
(CVE-2022-26496)

Packaging has been adjusted to create the required nbd user and group at
installation.

References:
- https://bugs.mageia.org/show_bug.cgi?id=30153
- https://www.debian.org/lts/security/2022/dla-2944
- https://www.debian.org/security/2022/dsa-5100
- https://ubuntu.com/security/notices/USN-5323-1
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/PU5JFD4PEJED72TZLZ5R2Q2SFXICU5I5/
- https://lists.opensuse.org/archives/list/[email protected]/thread/GY3FXWPGNBOFA2QZOFDFNU2AZJWYEW7A/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26495
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26496

SRPMS:
- 8/core/nbd-3.24-1.2.mga8

Mageia 2022-0403: nbd security update

It was discovered that nbd prior to 3.24 contained an integer overflow with a resultant heap-based buffer overflow

Summary

It was discovered that nbd prior to 3.24 contained an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name resulting in a write to a dangling pointer (CVE-2022-26495).
Stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name. (CVE-2022-26496)
Packaging has been adjusted to create the required nbd user and group at installation.

References

- https://bugs.mageia.org/show_bug.cgi?id=30153

- https://www.debian.org/lts/security/2022/dla-2944

- https://www.debian.org/security/2022/dsa-5100

- https://ubuntu.com/security/notices/USN-5323-1

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/PU5JFD4PEJED72TZLZ5R2Q2SFXICU5I5/

- https://lists.opensuse.org/archives/list/[email protected]/thread/GY3FXWPGNBOFA2QZOFDFNU2AZJWYEW7A/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26495

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26496

Resolution

MGASA-2022-0403 - Updated nbd packages fix security vulnerability

SRPMS

- 8/core/nbd-3.24-1.2.mga8

Severity
Publication date: 01 Nov 2022
URL: https://advisories.mageia.org/MGASA-2022-0403.html
Type: security
CVE: CVE-2022-26495, CVE-2022-26496

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.