A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
The product does not handle or incorrectly handles when a particular element is not the expected type, e.g. it expects a digit (0-9) but is provided with a letter (A-Z).
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:2204 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-5215 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241041 | vendor advisory issue tracking |
https://listman.redhat.com/archives/libguestfs/2023-September/032635.html | patch exploit |