A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.
Metrics
Affected Vendors & Products
References
History
Fri, 19 Dec 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd. | |
| Title | Libnbd: libnbd: arbitrary code execution via ssh argument injection through a malicious uri | |
| First Time appeared |
Redhat
Redhat container Native Virtualization Redhat enterprise Linux |
|
| Weaknesses | CWE-88 | |
| CPEs | cpe:/a:redhat:container_native_virtualization:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat container Native Virtualization Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-19T13:02:38.342Z
Reserved: 2025-12-19T03:34:44.633Z
Link: CVE-2025-14946
No data.
Status : Received
Published: 2025-12-19T13:16:03.127
Modified: 2025-12-19T13:16:03.127
Link: CVE-2025-14946
No data.
OpenCVE Enrichment
No data.