CVE-2025-2173
Publication date 11 March 2025
Last updated 24 March 2025
Ubuntu priority
Cvss 3 Severity Score
A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
Status
Package | Ubuntu Release | Status |
---|---|---|
zvbi | 24.10 oracular |
Fixed 0.2.42-2ubuntu0.24.10.2
|
24.04 LTS noble |
Fixed 0.2.42-2ubuntu0.24.04.1~esm1
|
|
22.04 LTS jammy |
Fixed 0.2.35-19ubuntu0.1~esm1
|
|
20.04 LTS focal |
Fixed 0.2.35-17ubuntu0.1~esm1
|
|
18.04 LTS bionic |
Fixed 0.2.35-13ubuntu0.1~esm1
|
|
16.04 LTS xenial |
Fixed 0.2.35-10ubuntu0.1~esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
rodrigo-zaiden
same fix commit for CVE-2025-2173, CVE-2025-2174 CVE-2025-2175, CVE-2025-2176, CVE-2025-2177
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-7367-1
- zvbi vulnerabilities
- 24 March 2025