Libnbd Red Hat Libnbd

Do you want an email whenever new security vulnerabilities are reported in Red Hat Libnbd?

Recent Red Hat Libnbd Security Advisories

Advisory Title Published
RHSA-2024:2204 (RHSA-2024:2204) Moderate: libnbd security update April 30, 2024

By the Year

In 2024 there have been 0 vulnerabilities in Red Hat Libnbd . Last year Libnbd had 2 security vulnerabilities published. Right now, Libnbd is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 2 5.90
2022 1 4.80
2021 1 2.70
2020 0 0.00
2019 1 9.80
2018 0 0.00

It may take a day or so for new Libnbd vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Libnbd Security Vulnerabilities

A flaw was found in libnbd

CVE-2023-5871 5.3 - Medium - November 27, 2023

A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service.

assertion failure

A flaw was found in libnbd

CVE-2023-5215 6.5 - Medium - September 28, 2023

A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.

Unchecked Return Value

A flaw was found in the copying tool `nbdcopy` of libnbd

CVE-2022-0485 4.8 - Medium - August 29, 2022

A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This could result in the silent creation of a corrupted destination image.

Unchecked Return Value

A flaw was found in libnbd 1.7.3

CVE-2021-20286 2.7 - Low - March 15, 2021

A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service.

assertion failure

Structured reply is a feature of the newstyle NBD protocol allowing the server to send a reply in chunks

CVE-2019-14842 9.8 - Critical - November 26, 2019

Structured reply is a feature of the newstyle NBD protocol allowing the server to send a reply in chunks. A bounds check which was supposed to test for chunk offsets smaller than the beginning of the request did not work because of signed/unsigned confusion. If one of these chunks contains a negative offset then data under control of the server is written to memory before the read buffer supplied by the client. If the read buffer is located on the stack then this allows the stack return address from nbd_pread() to be trivially modified, allowing arbitrary code execution under the control of the server. If the buffer is located on the heap then other memory objects before the buffer can be overwritten, which again would usually lead to arbitrary code execution.

Incorrect Conversion between Numeric Types

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Libnbd or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe