Количество 8
Количество 8

BDU:2025-05982
Уязвимость библиотеки захвата и декодирования VBI libzvbi, связанная с целочисленным переполнением в функции bi_strndup_iconv_ucs2(), позволяющая нарушителю вызвать отказ в обслуживании

CVE-2025-2174
A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.

CVE-2025-2174
A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
CVE-2025-2174
A vulnerability was found in libzvbi up to 0.2.43. It has been declare ...
GHSA-2gqq-g5xg-qr37
A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.

SUSE-SU-2025:0988-1
Security update for zvbi

SUSE-SU-2025:0979-1
Security update for zvbi

ROS-20250430-09
Множественные уязвимости zvbi
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2025-05982 Уязвимость библиотеки захвата и декодирования VBI libzvbi, связанная с целочисленным переполнением в функции bi_strndup_iconv_ucs2(), позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | 3 месяца назад |
![]() | CVE-2025-2174 A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional. | CVSS3: 5.3 | 0% Низкий | 3 месяца назад |
![]() | CVE-2025-2174 A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional. | CVSS3: 5.3 | 0% Низкий | 3 месяца назад |
CVE-2025-2174 A vulnerability was found in libzvbi up to 0.2.43. It has been declare ... | CVSS3: 5.3 | 0% Низкий | 3 месяца назад | |
GHSA-2gqq-g5xg-qr37 A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional. | CVSS3: 5.3 | 0% Низкий | 3 месяца назад | |
![]() | SUSE-SU-2025:0988-1 Security update for zvbi | 3 месяца назад | ||
![]() | SUSE-SU-2025:0979-1 Security update for zvbi | 3 месяца назад | ||
![]() | ROS-20250430-09 Множественные уязвимости zvbi | CVSS3: 7.3 | около 2 месяцев назад |
Уязвимостей на страницу