Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU82550
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-5215
CWE-ID:
CWE-252 - Unchecked Return Value
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation when handling server responses in NBD client. A remote server can return a block size larger than 2^63 and crash the client.
Update the affected package libnbd to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3 - 15.5
libnbd-bash-completion: before 1.18.1-150300.8.15.1
libnbd0-debuginfo: before 1.18.1-150300.8.15.1
libnbd: before 1.18.1-150300.8.15.1
nbdfuse-debuginfo: before 1.18.1-150300.8.15.1
nbdfuse: before 1.18.1-150300.8.15.1
python3-libnbd: before 1.18.1-150300.8.15.1
python3-libnbd-debuginfo: before 1.18.1-150300.8.15.1
libnbd-devel: before 1.18.1-150300.8.15.1
libnbd-debugsource: before 1.18.1-150300.8.15.1
libnbd0: before 1.18.1-150300.8.15.1
libnbd-debuginfo: before 1.18.1-150300.8.15.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234222-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.