Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2023-5215: libnbd: Crash or misbehaviour when NBD server returns an unexpected block size (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2023-5215: libnbd: Crash or misbehaviour when NBD server returns an unexpected block size (Multiple Advisories)

Severity
5
CVSS
(AV:A/AC:H/Au:N/C:N/I:N/A:C)
Published
09/28/2023
Created
05/01/2024
Added
05/01/2024
Modified
05/01/2024

Description

A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.

Solution(s)

  • redhat-upgrade-libnbd
  • redhat-upgrade-libnbd-bash-completion
  • redhat-upgrade-libnbd-debuginfo
  • redhat-upgrade-libnbd-debugsource
  • redhat-upgrade-libnbd-devel
  • redhat-upgrade-nbdfuse
  • redhat-upgrade-nbdfuse-debuginfo
  • redhat-upgrade-ocaml-libnbd
  • redhat-upgrade-ocaml-libnbd-debuginfo
  • redhat-upgrade-ocaml-libnbd-devel
  • redhat-upgrade-python3-libnbd
  • redhat-upgrade-python3-libnbd-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;