bf2e459bb9
Fix CVE-2022-26495: In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages. Fix CVE-2022-26496: In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name. https://github.com/NetworkBlockDevice/nbd/compare/nbd-3.21...nbd-3.24 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
8 lines
372 B
Plaintext
8 lines
372 B
Plaintext
# From http://sourceforge.net/projects/nbd/files/nbd/3.24/
|
|
md5 a6d9e7bbc311a2ed07ef84a58b82b5dd nbd-3.24.tar.xz
|
|
sha1 72c59ef5186ae355de6f539a1b348e18cbb8314e nbd-3.24.tar.xz
|
|
|
|
# Locally calculated
|
|
sha256 6877156d23a7b33f75eee89d2f5c2c91c542afc3cdcb636dea5a88539a58d10c nbd-3.24.tar.xz
|
|
sha256 8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643 COPYING
|