A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:2204 | |
https://access.redhat.com/security/cve/CVE-2023-5215 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241041 | Issue Tracking Vendor Advisory |
https://listman.redhat.com/archives/libguestfs/2023-September/032635.html | Exploit Patch |
Configurations
Configuration 1 (hide)
|
History
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jan 2024, 19:03
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-28 14:15
Updated : 2024-04-30 14:15
NVD link : CVE-2023-5215
Mitre link : CVE-2023-5215
CVE.ORG link : CVE-2023-5215
JSON object : View
Products Affected
redhat
- libnbd
- enterprise_linux