CVE-2023-5215
Summary
| CVE | CVE-2023-5215 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-28 14:15:00 UTC |
| Updated | 2024-01-03 19:03:00 UTC |
| Description | A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 2241041 – (CVE-2023-5215) CVE-2023-5215 libnbd: NBS server does not return expeted block size |
MISC |
bugzilla.redhat.com |
|
| cve-details |
MISC |
access.redhat.com |
|
| [Libguestfs] [libnbd PATCH v2 3/6] api: Sanitize sizes larger than INT64_MAX |
MISC |
listman.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 755171 SUSE Enterprise Linux Security Update for libnbd (SUSE-SU-2023:4222-1)
- 907526 Common Base Linux Mariner (CBL-Mariner) Security Update for libnbd (31095-1)