CVE-2025-47712

A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:nbdkit_project:nbdkit:-:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_advanced_virtualization:8.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-06-09 06:15

Updated : 2025-08-21 01:19


NVD link : CVE-2025-47712

Mitre link : CVE-2025-47712

CVE.ORG link : CVE-2025-47712


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_linux_advanced_virtualization

nbdkit_project

  • nbdkit
CWE
CWE-190

Integer Overflow or Wraparound