Vulnerability Description
NanaZip is an open source file archive. From 5.0.1252.0 to before 6.0.1698.0, a denial-of-service vulnerability exists in the littlefs filesystem image parser in NanaZip. The handler's Open method reads BlockCount directly from the attacker-controlled superblock without any validation against the actual file size or any upper-bound ceiling, then iterates BlockCount times, allocating a file-path entry per iteration. A crafted 44-byte littlefs image with BlockCount = 0xFFFFFFFF causes ~4 billion heap allocations, exhausting available memory. This vulnerability is fixed in 6.0.1698.0.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| M2Team | Nanazip | >= 5.0.1252.0, < 6.0.1698.0 |
Related Weaknesses (CWE)
References
- https://github.com/M2Team/NanaZip/security/advisories/GHSA-7hqh-mq57-wjmqMitigationVendor Advisory
- https://github.com/M2Team/NanaZip/security/advisories/GHSA-7hqh-mq57-wjmqMitigationVendor Advisory
FAQ
What is CVE-2026-42444?
CVE-2026-42444 is a vulnerability with a CVSS score of 3.3 (LOW). NanaZip is an open source file archive. From 5.0.1252.0 to before 6.0.1698.0, a denial-of-service vulnerability exists in the littlefs filesystem image parser in NanaZip. The handler's Open method rea...
How severe is CVE-2026-42444?
CVE-2026-42444 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42444?
Check the references section above for vendor advisories and patch information. Affected products include: M2Team Nanazip.