Lucene search

K
mageiaGentoo FoundationMGASA-2024-0174
HistoryMay 10, 2024 - 7:09 p.m.

Updated libnbd packages fix security vulnerability

2024-05-1019:09:48
Gentoo Foundation
advisories.mageia.org
14
libnbd
security vulnerability
server
block size
nbd clients
application crash
unintended behavior
cve-2023-5215
unix

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%

A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn’t treat the return value of the nbd_get_size() function correctly. (CVE-2023-5215)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchlibnbd< 1.15.8-3.1libnbd-1.15.8-3.1.mga9

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%