rpm package
opensuse/nbdkit&distro=openSUSE Leap 15.6
pkg:rpm/opensuse/nbdkit&distro=openSUSE%20Leap%2015.6
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-47711 | — | < 1.36.5-150400.3.9.1 | 1.36.5-150400.3.9.1 | Jun 9, 2025 | There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical i | ||
| CVE-2025-47712 | — | < 1.36.5-150400.3.9.1 | 1.36.5-150400.3.9.1 | Jun 9, 2025 | A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of ser |
- CVE-2025-47711Jun 9, 2025affected < 1.36.5-150400.3.9.1fixed 1.36.5-150400.3.9.1
There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical i
- CVE-2025-47712Jun 9, 2025affected < 1.36.5-150400.3.9.1fixed 1.36.5-150400.3.9.1
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of ser