A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:2204 | |
https://access.redhat.com/security/cve/CVE-2023-5215 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241041 | Issue Tracking Vendor Advisory |
https://listman.redhat.com/archives/libguestfs/2023-September/032635.html | Exploit Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2023-09-28T13:55:32.462Z
Updated: 2024-05-01T20:21:22.207Z
Reserved: 2023-09-26T21:54:47.184Z
Link: CVE-2023-5215
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-28T14:15:26.117
Modified: 2024-04-30T14:15:11.137
Link: CVE-2023-5215
JSON object: View
Redhat Information
No data.