{"affected":[{"ecosystem_specific":{"binaries":[{"nbdkit":"1.36.5-150400.3.9.1","nbdkit-basic-filters":"1.36.5-150400.3.9.1","nbdkit-basic-plugins":"1.36.5-150400.3.9.1","nbdkit-curl-plugin":"1.36.5-150400.3.9.1","nbdkit-nbd-plugin":"1.36.5-150400.3.9.1","nbdkit-python-plugin":"1.36.5-150400.3.9.1","nbdkit-server":"1.36.5-150400.3.9.1","nbdkit-ssh-plugin":"1.36.5-150400.3.9.1","nbdkit-vddk-plugin":"1.36.5-150400.3.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP6","name":"nbdkit","purl":"pkg:rpm/suse/nbdkit&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.36.5-150400.3.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nbdkit":"1.36.5-150400.3.9.1","nbdkit-bash-completion":"1.36.5-150400.3.9.1","nbdkit-basic-filters":"1.36.5-150400.3.9.1","nbdkit-basic-plugins":"1.36.5-150400.3.9.1","nbdkit-curl-plugin":"1.36.5-150400.3.9.1","nbdkit-devel":"1.36.5-150400.3.9.1","nbdkit-example-plugins":"1.36.5-150400.3.9.1","nbdkit-gzip-filter":"1.36.5-150400.3.9.1","nbdkit-linuxdisk-plugin":"1.36.5-150400.3.9.1","nbdkit-nbd-plugin":"1.36.5-150400.3.9.1","nbdkit-python-plugin":"1.36.5-150400.3.9.1","nbdkit-server":"1.36.5-150400.3.9.1","nbdkit-ssh-plugin":"1.36.5-150400.3.9.1","nbdkit-tar-filter":"1.36.5-150400.3.9.1","nbdkit-tmpdisk-plugin":"1.36.5-150400.3.9.1","nbdkit-vddk-plugin":"1.36.5-150400.3.9.1","nbdkit-xz-filter":"1.36.5-150400.3.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"nbdkit","purl":"pkg:rpm/opensuse/nbdkit&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.36.5-150400.3.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nbdkit fixes the following issues:\n\nUpdate to version 1.36.5.\n\nSecurity fixes:\n\n- CVE-2025-47712: integer overflow in blocksize filter when processing client block status requests larger than 2**32\n  will trigger an assertion failure and cause a denial-of-service. (bsc#1243108).\n- CVE-2025-47711: off-by-one error when processing block status results from plugins on behalf of an NBD client may\n  trigger an assertion failure and cause a denial of service (bsc#1243110).\n\nOther fixes and changes:\n\n- tests: Add test-blkio.sh to unconditional EXTRA_DIST rule.\n- Revert 'valgrind: Add suppression for liblzma bug'.\n- vddk: Move 'Unknown error' information to the manual.\n- ocaml Add better comments to the example plugin.\n- ocaml: Simplify pread operation.\n- ocaml: Define a struct handle to hold the OCaml handle.\n- ocaml: Add OCaml version to --dump-plugin output.\n- ocaml: Print callback name when an exception is printed.\n- ocaml: Combine all exception printing into a single macro.\n","id":"SUSE-SU-2025:01889-1","modified":"2025-06-11T05:43:35Z","published":"2025-06-11T05:43:35Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501889-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-47711"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-47712"}],"related":["CVE-2025-47711","CVE-2025-47712"],"summary":"Security update for nbdkit","upstream":["CVE-2025-47711","CVE-2025-47712"]}