Описание
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
lunar | ignored | end of life, was needs-triage |
mantic | ignored | end of life, was needs-triage |
noble | needs-triage |
Показывать по
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
A flaw was found in libnbd. A server can reply with a block size large ...
EPSS
5.3 Medium
CVSS3