Description
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.
Problem types
Integer Overflow or Wraparound
Product status
1.21.16 (semver) before 1.38.6
1.40.0 (semver) before 1.40.6
1.42.0 (semver) before 1.42.3
Timeline
| 2025-05-12: | Reported to Red Hat. |
| 2025-04-23: | Made public. |
References
access.redhat.com/security/cve/CVE-2025-47712
bugzilla.redhat.com/show_bug.cgi?id=2365724 (RHBZ#2365724)
lists.libguestfs.org/...ad/67E7AASHHADIY7VAD3FFW2I67LTWVWYF/
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.