rpm package
opensuse/libnbd&distro=openSUSE Leap 15.4
pkg:rpm/opensuse/libnbd&distro=openSUSE%20Leap%2015.4
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-5871 | — | < 1.18.1-150300.8.18.1 | 1.18.1-150300.8.18.1 | Nov 27, 2023 | A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service. | ||
| CVE-2023-5215 | — | < 1.18.1-150300.8.15.1 | 1.18.1-150300.8.15.1 | Sep 28, 2023 | A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_g | ||
| CVE-2022-0485 | — | < 1.9.3-150300.8.9.1 | 1.9.3-150300.8.9.1 | Aug 29, 2022 | A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This could result in the |
- CVE-2023-5871Nov 27, 2023affected < 1.18.1-150300.8.18.1fixed 1.18.1-150300.8.18.1
A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service.
- CVE-2023-5215Sep 28, 2023affected < 1.18.1-150300.8.15.1fixed 1.18.1-150300.8.15.1
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_g
- CVE-2022-0485Aug 29, 2022affected < 1.9.3-150300.8.9.1fixed 1.9.3-150300.8.9.1
A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This could result in the