| Name | CVE-2025-14946 |
| Description | A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| libnbd (PTS) | bullseye | 1.6.1-1 | vulnerable |
| bookworm | 1.14.2-1 | fixed | |
| trixie | 1.22.2-1 | vulnerable | |
| forky, sid | 1.22.5-1 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| libnbd | source | bookworm | (not affected) | |||
| libnbd | source | (unstable) | (unfixed) |
[bookworm] - libnbd <not-affected> (Vulnerable code introduced later)
https://libguestfs.org/libnbd-release-notes-1.24.1.html#Security
https://lists.libguestfs.org/archives/list/guestfs@lists.libguestfs.org/thread/YZMBF3SJRWTRVT5L3KWSNHITFTRMQNTT/
Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/fffd87a3ba216cf2f9c212e5db96b13b98985edf (v1.23.9)
nbd+ssh support introduced with: https://gitlab.com/nbdkit/libnbd/-/commit/b3802e3a987eb1ffa34c385e36033465d2bd2ba3 (v1.21.2)