Impact
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
Patches
The problem is fixed in NBD 3.24
Workarounds
No known workarounds exist
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26496
For more information
If you have any questions or comments about this advisory, email us at the mailinglist
Impact
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
Patches
The problem is fixed in NBD 3.24
Workarounds
No known workarounds exist
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26496
For more information
If you have any questions or comments about this advisory, email us at the mailinglist