There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical internal error, leading to a denial-of-service.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 09 Jun 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical internal error, leading to a denial-of-service. |
Title | nbdkit: nbdkit-server: off-by-one error when processing block status may lead to a Denial of Service | Nbdkit: nbdkit-server: off-by-one error when processing block status may lead to a denial of service |
First Time appeared |
Redhat
Redhat advanced Virtualization Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:advanced_virtualization:8::el8 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat advanced Virtualization Redhat enterprise Linux |
|
References |
|
Tue, 13 May 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | nbdkit: nbdkit-server: off-by-one error when processing block status may lead to a Denial of Service | |
Weaknesses | CWE-193 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-06-09T06:03:47.063Z
Updated: 2025-06-09T18:19:57.680Z
Reserved: 2025-05-07T21:08:45.449Z
Link: CVE-2025-47711

Updated: 2025-06-09T18:19:52.080Z

Status : Awaiting Analysis
Published: 2025-06-09T06:15:25.320
Modified: 2025-06-09T12:15:47.880
Link: CVE-2025-47711
