Re: [DSA 924-1] New nbd packages fix potential arbitrary code execution
<tongue location="cheek">
On Wed, Dec 21, 2005 at 03:05:01PM +0100, Martin Schulze wrote:
> Kurt Fitzner discovered a buffer overflow in nbd, the network block
> device client and server that could potentially allow arbitrary cod on
> the NBD server.
Do penguins eat cod, or just herring? Personally, I consider this a major
security flaw, as I prefer rational fish on my NBD servers (and in fact all
of my servers).
- Matt
</tongue>
Reply to: