Mageia 2022-0403: nbd security update
Summary
It was discovered that nbd prior to 3.24 contained an integer overflow
with a resultant heap-based buffer overflow. A value of 0xffffffff in the
name length field will cause a zero-sized buffer to be allocated for the
name resulting in a write to a dangling pointer (CVE-2022-26495).
Stack-based buffer overflow. An attacker can cause a buffer overflow in
the parsing of the name field by sending a crafted NBD_OPT_INFO or
NBD_OPT_GO message with an large value as the length of the name.
(CVE-2022-26496)
Packaging has been adjusted to create the required nbd user and group at
installation.
References
- https://bugs.mageia.org/show_bug.cgi?id=30153
- https://www.debian.org/lts/security/2022/dla-2944
- https://www.debian.org/security/2022/dsa-5100
- https://ubuntu.com/security/notices/USN-5323-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/PU5JFD4PEJED72TZLZ5R2Q2SFXICU5I5/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3FXWPGNBOFA2QZOFDFNU2AZJWYEW7A/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26495
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26496
Resolution
MGASA-2022-0403 - Updated nbd packages fix security vulnerability
SRPMS
- 8/core/nbd-3.24-1.2.mga8