CVE-2025-14946

NameCVE-2025-14946
DescriptionA flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnbd (PTS)bullseye1.6.1-1fixed
bookworm1.14.2-1fixed
trixie1.22.2-1vulnerable
forky, sid1.24.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnbdsourcebullseye(not affected)
libnbdsourcebookworm(not affected)
libnbdsource(unstable)1.22.5-1

Notes

[trixie] - libnbd <no-dsa> (Minor issue)
[bookworm] - libnbd <not-affected> (Vulnerable code introduced later)
[bullseye] - libnbd <not-affected> (Vulnerable code introduced later)
https://libguestfs.org/libnbd-release-notes-1.24.1.html#Security
https://lists.libguestfs.org/archives/list/guestfs@lists.libguestfs.org/thread/YZMBF3SJRWTRVT5L3KWSNHITFTRMQNTT/
Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/fffd87a3ba216cf2f9c212e5db96b13b98985edf (v1.23.9)
Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/f461fe64d21fe8a6d32b56ccb50d06489d2e2698 (v1.22.5)
nbd+ssh support introduced with: https://gitlab.com/nbdkit/libnbd/-/commit/b3802e3a987eb1ffa34c385e36033465d2bd2ba3 (v1.21.2)

Search for package or bug name: Reporting problems