Description
A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.
Problem types
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Product status
1.22.0 (semver) before 1.22.5
1.23.0 (semver) before 1.23.9
Timeline
| 2025-12-19: | Reported to Red Hat. |
| 2025-12-16: | Made public. |
References
access.redhat.com/security/cve/CVE-2025-14946
bugzilla.redhat.com/show_bug.cgi?id=2423789 (RHBZ#2423789)
libguestfs.org/libnbd-release-notes-1.24.1.html
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.