Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47712: Integer Overflow or Wraparound

0
Medium
VulnerabilityCVE-2025-47712cvecve-2025-47712
Published: Mon Jun 09 2025 (06/09/2025, 05:58:41 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.

AI-Powered Analysis

AILast updated: 11/08/2025, 07:47:43 UTC

Technical Analysis

CVE-2025-47712 is an integer overflow or wraparound vulnerability found in the "blocksize" filter of nbdkit, a network block device server used to provide virtual block devices over a network. The vulnerability occurs when a client issues a request for block status information covering a very large data range that exceeds internal limits. This causes an integer overflow or wraparound in the calculation of the data size or block count, leading to an internal error within nbdkit. The result is a denial of service (DoS) condition where the nbdkit process crashes or becomes unresponsive, disrupting access to the virtual block device. The vulnerability affects specific versions of nbdkit (1.21.16, 1.40.0, 1.42.0) running on Red Hat Enterprise Linux 10. Exploitation requires network access and low privileges (PR:L), but no user interaction is needed. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. No known exploits have been reported in the wild as of the publication date. The flaw stems from insufficient validation of client-supplied parameters leading to arithmetic overflow during block size calculations in the blocksize filter module. This vulnerability could be leveraged by an attacker to disrupt services relying on nbdkit, potentially impacting storage availability in virtualized or containerized environments.

Potential Impact

For European organizations, the primary impact of CVE-2025-47712 is the potential denial of service on systems utilizing nbdkit for network block device provisioning, particularly those running Red Hat Enterprise Linux 10 with the affected versions. This can disrupt critical storage services, affecting virtual machines, containers, or other infrastructure components dependent on network block devices. Industries with high reliance on virtualized storage, such as finance, telecommunications, cloud service providers, and public sector entities, could experience service interruptions leading to operational downtime and potential financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could hinder business continuity and incident response capabilities. The lack of known exploits reduces immediate risk, but the ease of triggering the overflow with crafted client requests means attackers with network access could exploit this to cause outages. European organizations with exposed or internal network access to nbdkit services should consider the risk of targeted DoS attacks, especially in environments with limited redundancy or failover mechanisms.

Mitigation Recommendations

To mitigate CVE-2025-47712, organizations should prioritize updating nbdkit to a patched version once available from Red Hat or the nbdkit maintainers. In the absence of an immediate patch, administrators can implement network-level controls to restrict access to nbdkit services only to trusted clients and internal networks, minimizing exposure to untrusted actors. Monitoring and rate-limiting client requests for block status information can help detect and prevent attempts to trigger the overflow. Additionally, deploying application-layer firewalls or intrusion prevention systems capable of recognizing abnormal request patterns targeting nbdkit may reduce exploitation risk. System administrators should audit their environments to identify all instances of nbdkit running affected versions and verify that only authorized users have network access. Implementing redundancy and failover for critical storage services can reduce the operational impact of potential DoS events. Finally, maintaining comprehensive logging and alerting on nbdkit service crashes will facilitate rapid detection and response to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-07T21:08:45.449Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6846c60d7b622a9fdf1e7925

Added to database: 6/9/2025, 11:31:25 AM

Last enriched: 11/8/2025, 7:47:43 AM

Last updated: 11/22/2025, 4:42:39 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats