In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBDOPTINFO or NBDOPTGO message with an large value as the length of the name.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-26496.json"