DEBIAN-CVE-2025-14946

Source
https://security-tracker.debian.org/tracker/CVE-2025-14946
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-14946.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-14946
Upstream
  • CVE-2025-14946
Published
2025-12-19T13:16:03.127Z
Modified
2026-03-17T02:51:11.632268Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.

References

Affected packages

Debian:13 / libnbd

Package

Name
libnbd
Purl
pkg:deb/debian/libnbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.22.2-1
1.22.3-1
1.22.5-1
1.24.0-1
1.24.0-2
1.24.0-2.1
1.24.1-1
1.24.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-14946.json"

Debian:14 / libnbd

Package

Name
libnbd
Purl
pkg:deb/debian/libnbd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.5-1

Affected versions

1.*
1.22.2-1
1.22.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-14946.json"