Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, ensure that applications utilizing libnbd do not process Uniform Resource Identifiers (URIs) from untrusted or unverified sources. This vulnerability requires a malicious actor to convince libnbd to open a specially crafted URI, therefore restricting the sources of URIs processed by libnbd can reduce exposure.
Fri, 19 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd. | |
| Title | Libnbd: libnbd: arbitrary code execution via ssh argument injection through a malicious uri | |
| First Time appeared |
Redhat
Redhat container Native Virtualization Redhat enterprise Linux |
|
| Weaknesses | CWE-88 | |
| CPEs | cpe:/a:redhat:container_native_virtualization:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat container Native Virtualization Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-19T15:13:42.235Z
Reserved: 2025-12-19T03:34:44.633Z
Link: CVE-2025-14946
Updated: 2025-12-19T15:13:38.269Z
Status : Received
Published: 2025-12-19T13:16:03.127
Modified: 2025-12-19T13:16:03.127
Link: CVE-2025-14946
No data.
OpenCVE Enrichment
No data.