Headline
CVE-2022-26496: Network Block Device - Browse /nbd at SourceForge.net
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
Get project updates, sponsored content from our select partners, and more.
Full Name
Phone Number
Job Title
Industry
Company
Company Size
Get notifications on updates for this project. Get the SourceForge newsletter. Get newsletters and notices that include site news, special offers and exclusive discounts about IT products & services.
I agree to receive these communications from SourceForge.net. I understand that I can withdraw my consent at anytime. Please refer to our Terms of Use and Privacy Policy or Contact Us for more details. I agree to receive these communications from SourceForge.net. I understand that I can withdraw my consent at anytime. Please refer to our Terms of Use and Privacy Policy or Contact Us for more details.
JavaScript is required for this form.
You seem to have CSS turned off. Please don’t fill out this field.
You seem to have CSS turned off. Please don’t fill out this field.
No, thanks