CVE-2025-14946

NameCVE-2025-14946
DescriptionA flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnbd (PTS)bullseye1.6.1-1vulnerable
bookworm1.14.2-1fixed
trixie1.22.2-1vulnerable
forky, sid1.22.5-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnbdsourcebookworm(not affected)
libnbdsource(unstable)(unfixed)

Notes

[bookworm] - libnbd <not-affected> (Vulnerable code introduced later)
https://libguestfs.org/libnbd-release-notes-1.24.1.html#Security
https://lists.libguestfs.org/archives/list/guestfs@lists.libguestfs.org/thread/YZMBF3SJRWTRVT5L3KWSNHITFTRMQNTT/
Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/fffd87a3ba216cf2f9c212e5db96b13b98985edf (v1.23.9)
nbd+ssh support introduced with: https://gitlab.com/nbdkit/libnbd/-/commit/b3802e3a987eb1ffa34c385e36033465d2bd2ba3 (v1.21.2)

Search for package or bug name: Reporting problems