Количество 7
Количество 7

CVE-2025-2173
A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.

CVE-2025-2173
A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
CVE-2025-2173
A vulnerability was found in libzvbi up to 0.2.43. It has been classif ...

BDU:2025-06066
Уязвимость функции vbi_strndup_iconv_ucs2() библиотеки захвата и декодирования VBI libzvbi, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

SUSE-SU-2025:0988-1
Security update for zvbi

SUSE-SU-2025:0979-1
Security update for zvbi

ROS-20250430-09
Множественные уязвимости zvbi
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-2173 A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional. | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2025-2173 A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional. | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад |
CVE-2025-2173 A vulnerability was found in libzvbi up to 0.2.43. It has been classif ... | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад | |
![]() | BDU:2025-06066 Уязвимость функции vbi_strndup_iconv_ucs2() библиотеки захвата и декодирования VBI libzvbi, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад |
![]() | SUSE-SU-2025:0988-1 Security update for zvbi | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0979-1 Security update for zvbi | 6 месяцев назад | ||
![]() | ROS-20250430-09 Множественные уязвимости zvbi | CVSS3: 7.3 | 4 месяца назад |
Уязвимостей на страницу