Skip to main content

CVE-2025-47712: Integer Overflow or Wraparound

Medium
VulnerabilityCVE-2025-47712cvecve-2025-47712
Published: Mon Jun 09 2025 (06/09/2025, 05:58:41 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:11:06 UTC

Technical Analysis

CVE-2025-47712 is a medium-severity vulnerability affecting the nbdkit "blocksize" filter component used in Red Hat Enterprise Linux 10, specifically versions 1.21.16, 1.40.0, and 1.42.0. The flaw arises from an integer overflow or wraparound condition triggered when a client sends a request for block status information over an excessively large data range. This malformed request causes an internal error within nbdkit, leading to a denial of service (DoS) condition. The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L) but requires some level of privileges (PR:L), and no user interaction is needed (UI:N). The impact is limited to availability, with no confidentiality or integrity compromise. The vulnerability does not appear to have known exploits in the wild as of the published date. The root cause is an unchecked or improperly handled integer calculation in the blocksize filter when processing large data range requests, which results in an overflow or wraparound, causing the software to crash or become unresponsive. This can disrupt services relying on nbdkit for network block device operations, potentially affecting storage virtualization or cloud infrastructure components that utilize this technology. Given the nature of the flaw, attackers with limited privileges on the network can cause service interruptions, impacting system availability but not data confidentiality or integrity.

Potential Impact

For European organizations, the primary impact of CVE-2025-47712 is the risk of denial of service on systems using nbdkit, particularly in environments leveraging Red Hat Enterprise Linux 10. This can affect cloud service providers, data centers, and enterprises relying on network block device services for storage virtualization or remote block storage access. Disruption of these services could lead to downtime, impacting business continuity and operational efficiency. While the vulnerability does not allow data theft or modification, the availability loss can affect critical infrastructure, especially in sectors like finance, telecommunications, and public services where uptime is crucial. Organizations with automated or large-scale storage operations may experience cascading effects if nbdkit services become unavailable. The requirement for some privilege level to exploit reduces the risk from external attackers but does not eliminate insider threats or lateral movement scenarios within compromised networks. The absence of known exploits in the wild suggests a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

1. Apply patches or updates from Red Hat as soon as they become available for the affected nbdkit versions (1.21.16, 1.40.0, 1.42.0). 2. Implement strict network segmentation and access controls to limit which clients can send requests to nbdkit services, reducing exposure to potentially malicious requests. 3. Monitor network traffic for unusually large or malformed block status requests that could indicate exploitation attempts. 4. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) tuned to detect anomalies in nbdkit behavior. 5. Restrict privileges for users and services interacting with nbdkit to minimize the risk of exploitation by low-privilege attackers. 6. Conduct regular security audits and vulnerability scans focusing on storage and virtualization components to identify vulnerable instances. 7. Prepare incident response plans to quickly address potential denial of service events affecting storage infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-07T21:08:45.449Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6846c60d7b622a9fdf1e7925

Added to database: 6/9/2025, 11:31:25 AM

Last enriched: 9/10/2025, 3:11:06 AM

Last updated: 9/26/2025, 6:45:35 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats