First published: Wed Sep 27 2023(Updated: )
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libnbd | <1.18.0 | 1.18.0 |
<1.18.0 | ||
=8.0 | ||
=9.0 | ||
Redhat Libnbd | <1.18.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5215 is a vulnerability found in libnbd that allows a server to reply with a block size larger than 2^63, leading to potential application crashes or unintended behavior for NBD clients.
The severity of CVE-2023-5215 is medium, with a severity value of 5.3.
CVE-2023-5215 affects libnbd by allowing a server to respond with an oversized block size, which can cause issues in NBD clients that do not handle the returned value properly.
To fix CVE-2023-5215, update libnbd to version 1.18.0 or later, provided by the Red Hat package.
You can find more information about CVE-2023-5215 in the following references: - [Red Hat Security Advisory](https://access.redhat.com/security/cve/CVE-2023-5215) - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2241041) - [libguestfs Mailing List](https://listman.redhat.com/archives/libguestfs/2023-September/032635.html)