Unrated severityNVD Advisory· Published Jun 9, 2025· Updated Jan 8, 2026
Nbd: nbdkit: integer overflow triggers an assertion resulting in denial of service
CVE-2025-47712
Description
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.
Affected products
6(expand)+ 1 more
- (no CPE)
- (no CPE)
- osv-coords4 versionspkg:rpm/opensuse/nbdkit&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/nbdkit&distro=openSUSE%20Tumbleweedpkg:rpm/suse/nbdkit&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/nbdkit&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7
< 1.36.5-150400.3.9.1+ 3 more
- (no CPE)range: < 1.36.5-150400.3.9.1
- (no CPE)range: < 1.42.3-1.1
- (no CPE)range: < 1.36.5-150400.3.9.1
- (no CPE)range: < 1.40.6-150700.4.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- access.redhat.com/security/cve/CVE-2025-47712mitrevdb-entryx_refsource_REDHAT
- bugzilla.redhat.com/show_bug.cgimitreissue-trackingx_refsource_REDHAT
- lists.libguestfs.org/archives/list/guestfs@lists.libguestfs.org/thread/67E7AASHHADIY7VAD3FFW2I67LTWVWYF/mitre
News mentions
0No linked articles in our index yet.