A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-11-15T16:34:07.074Z
Reserved: 2023-09-26T21:54:47.184Z
Link: CVE-2023-5215

No data.

Status : Modified
Published: 2023-09-28T14:15:26.117
Modified: 2024-11-21T08:41:18.790
Link: CVE-2023-5215
