libnbd: Block Size Misinterpretation Causing Client Crash
CVE-2023-5215 Published on September 28, 2023
Libnbd: crash or misbehaviour when nbd server returns an unexpected block size
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
Vulnerability Analysis
Timeline
Reported to Red Hat.
Made public.
Weakness Type
Improper Handling of Unexpected Data Type
The software does not handle or incorrectly handles when a particular element is not the expected type, e.g. it expects a digit (0-9) but is provided with a letter (A-Z).
Products Associated with CVE-2023-5215
Want to know whenever a new CVE is published for Red Hat products? stack.watch will email you.
Affected Versions
Red Hat Enterprise Linux 9:- Version 0:1.18.1-3.el9 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.