A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:2204 | |
https://access.redhat.com/security/cve/CVE-2023-5215 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241041 | Issue Tracking Vendor Advisory |
https://listman.redhat.com/archives/libguestfs/2023-September/032635.html | Exploit Patch |
https://access.redhat.com/errata/RHSA-2024:2204 | |
https://access.redhat.com/security/cve/CVE-2023-5215 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241041 | Issue Tracking Vendor Advisory |
https://listman.redhat.com/archives/libguestfs/2023-September/032635.html | Exploit Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-09-28 14:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5215
Mitre link : CVE-2023-5215
CVE.ORG link : CVE-2023-5215
JSON object : View
Products Affected
redhat
- enterprise_linux
- libnbd