nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
https://www.openwall.com/lists/oss-security/2021/01/28/3
http://www.openwall.com/lists/oss-security/2021/02/01/1
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
Source: MITRE
Published: 2021-02-01
Updated: 2022-04-26
Type: CWE-362
Base Score: 4.4
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 3.4
Severity: MEDIUM
Base Score: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1
Severity: HIGH