DEBIAN-CVE-2023-5215

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-5215
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-5215.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-5215
Upstream
Published
2023-09-28T14:15:26Z
Modified
2025-09-18T05:18:39Z
Summary
[none]
Details

A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbdgetsize() function correctly.

References

Affected packages

Debian:11 / libnbd

Package

Name
libnbd
Purl
pkg:deb/debian/libnbd?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libnbd

Package

Name
libnbd
Purl
pkg:deb/debian/libnbd?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libnbd

Package

Name
libnbd
Purl
pkg:deb/debian/libnbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.16.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / libnbd

Package

Name
libnbd
Purl
pkg:deb/debian/libnbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.16.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}