CVE-2025-2177
Publication date 11 March 2025
Last updated 24 March 2025
Ubuntu priority
Cvss 3 Severity Score
A vulnerability classified as critical was found in libzvbi up to 0.2.43. This vulnerability affects the function vbi_search_new of the file src/search.c. The manipulation of the argument pat_len leads to integer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
Status
Package | Ubuntu Release | Status |
---|---|---|
zvbi | 24.10 oracular |
Fixed 0.2.42-2ubuntu0.24.10.2
|
24.04 LTS noble |
Fixed 0.2.42-2ubuntu0.24.04.1~esm1
|
|
22.04 LTS jammy |
Fixed 0.2.35-19ubuntu0.1~esm1
|
|
20.04 LTS focal |
Fixed 0.2.35-17ubuntu0.1~esm1
|
|
18.04 LTS bionic |
Fixed 0.2.35-13ubuntu0.1~esm1
|
|
16.04 LTS xenial |
Fixed 0.2.35-10ubuntu0.1~esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
rodrigo-zaiden
same fix commit for CVE-2025-2173, CVE-2025-2174 CVE-2025-2175, CVE-2025-2176, CVE-2025-2177
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-7367-1
- zvbi vulnerabilities
- 24 March 2025