Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-2174 (GCVE-0-2025-2174)
Vulnerability from cvelistv5 – Published: 2025-03-11 06:31 – Updated: 2025-03-11 13:40
VLAI?
EPSS
Summary
A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
Severity ?
5.3 (Medium)
5.3 (Medium)
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | libzvbi |
Affected:
0.2.0
Affected: 0.2.1 Affected: 0.2.2 Affected: 0.2.3 Affected: 0.2.4 Affected: 0.2.5 Affected: 0.2.6 Affected: 0.2.7 Affected: 0.2.8 Affected: 0.2.9 Affected: 0.2.10 Affected: 0.2.11 Affected: 0.2.12 Affected: 0.2.13 Affected: 0.2.14 Affected: 0.2.15 Affected: 0.2.16 Affected: 0.2.17 Affected: 0.2.18 Affected: 0.2.19 Affected: 0.2.20 Affected: 0.2.21 Affected: 0.2.22 Affected: 0.2.23 Affected: 0.2.24 Affected: 0.2.25 Affected: 0.2.26 Affected: 0.2.27 Affected: 0.2.28 Affected: 0.2.29 Affected: 0.2.30 Affected: 0.2.31 Affected: 0.2.32 Affected: 0.2.33 Affected: 0.2.34 Affected: 0.2.35 Affected: 0.2.36 Affected: 0.2.37 Affected: 0.2.38 Affected: 0.2.39 Affected: 0.2.40 Affected: 0.2.41 Affected: 0.2.42 Affected: 0.2.43 |
Credits
Yariv Nedivi
ninpwn (VulDB User)
ninpwn (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2174",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-11T13:25:13.046485Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-11T13:40:54.884Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "libzvbi",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "0.2.0"
},
{
"status": "affected",
"version": "0.2.1"
},
{
"status": "affected",
"version": "0.2.2"
},
{
"status": "affected",
"version": "0.2.3"
},
{
"status": "affected",
"version": "0.2.4"
},
{
"status": "affected",
"version": "0.2.5"
},
{
"status": "affected",
"version": "0.2.6"
},
{
"status": "affected",
"version": "0.2.7"
},
{
"status": "affected",
"version": "0.2.8"
},
{
"status": "affected",
"version": "0.2.9"
},
{
"status": "affected",
"version": "0.2.10"
},
{
"status": "affected",
"version": "0.2.11"
},
{
"status": "affected",
"version": "0.2.12"
},
{
"status": "affected",
"version": "0.2.13"
},
{
"status": "affected",
"version": "0.2.14"
},
{
"status": "affected",
"version": "0.2.15"
},
{
"status": "affected",
"version": "0.2.16"
},
{
"status": "affected",
"version": "0.2.17"
},
{
"status": "affected",
"version": "0.2.18"
},
{
"status": "affected",
"version": "0.2.19"
},
{
"status": "affected",
"version": "0.2.20"
},
{
"status": "affected",
"version": "0.2.21"
},
{
"status": "affected",
"version": "0.2.22"
},
{
"status": "affected",
"version": "0.2.23"
},
{
"status": "affected",
"version": "0.2.24"
},
{
"status": "affected",
"version": "0.2.25"
},
{
"status": "affected",
"version": "0.2.26"
},
{
"status": "affected",
"version": "0.2.27"
},
{
"status": "affected",
"version": "0.2.28"
},
{
"status": "affected",
"version": "0.2.29"
},
{
"status": "affected",
"version": "0.2.30"
},
{
"status": "affected",
"version": "0.2.31"
},
{
"status": "affected",
"version": "0.2.32"
},
{
"status": "affected",
"version": "0.2.33"
},
{
"status": "affected",
"version": "0.2.34"
},
{
"status": "affected",
"version": "0.2.35"
},
{
"status": "affected",
"version": "0.2.36"
},
{
"status": "affected",
"version": "0.2.37"
},
{
"status": "affected",
"version": "0.2.38"
},
{
"status": "affected",
"version": "0.2.39"
},
{
"status": "affected",
"version": "0.2.40"
},
{
"status": "affected",
"version": "0.2.41"
},
{
"status": "affected",
"version": "0.2.42"
},
{
"status": "affected",
"version": "0.2.43"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Yariv Nedivi"
},
{
"lang": "en",
"type": "reporter",
"value": "ninpwn (VulDB User)"
},
{
"lang": "en",
"type": "analyst",
"value": "ninpwn (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional."
},
{
"lang": "de",
"value": "In libzvbi bis 0.2.43 wurde eine problematische Schwachstelle ausgemacht. Dabei geht es um die Funktion vbi_strndup_iconv_ucs2 der Datei src/conv.c. Durch die Manipulation des Arguments src_length mit unbekannten Daten kann eine integer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 0.2.44 vermag dieses Problem zu l\u00f6sen. Der Patch wird als ca1672134b3e2962cd392212c73f44f8f4cb489f bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "Integer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-189",
"description": "Numeric Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-11T08:02:35.278Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-299203 | libzvbi conv.c vbi_strndup_iconv_ucs2 integer overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.299203"
},
{
"name": "VDB-299203 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.299203"
},
{
"name": "Submit #512800 | Open Source libzvbi 0.2.43 Integer Overflow -\u003e Heap Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.512800"
},
{
"tags": [
"related"
],
"url": "https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf"
},
{
"tags": [
"patch"
],
"url": "https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f"
},
{
"tags": [
"patch"
],
"url": "https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-03-11T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-03-11T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-03-11T09:03:47.000Z",
"value": "VulDB entry last update"
}
],
"title": "libzvbi conv.c vbi_strndup_iconv_ucs2 integer overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-2174",
"datePublished": "2025-03-11T06:31:06.971Z",
"dateReserved": "2025-03-10T17:26:56.285Z",
"dateUpdated": "2025-03-11T13:40:54.884Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-2174\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2025-03-11T07:15:36.887\",\"lastModified\":\"2025-10-03T00:25:40.883\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad en libzvbi hasta la versi\u00f3n 0.2.43. Se ha declarado como problem\u00e1tica. La funci\u00f3n vbi_strndup_iconv_ucs2 del archivo src/conv.c est\u00e1 afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento src_length provoca un desbordamiento de enteros. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y se puede utilizar. La actualizaci\u00f3n a la versi\u00f3n 0.2.44 puede solucionar este problema. El parche se llama ca1672134b3e2962cd392212c73f44f8f4cb489f. Se recomienda actualizar el componente afectado. La responsable del c\u00f3digo fue informada de antemano sobre los problemas. Reaccion\u00f3 muy r\u00e1pido y con gran profesionalidad.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"},{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zapping-vbi:zvbi:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.2.44\",\"matchCriteriaId\":\"2A797D3C-8334-46CA-9503-C6B145649870\"}]}]}],\"references\":[{\"url\":\"https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://vuldb.com/?ctiid.299203\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?id.299203\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?submit.512800\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-2174\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-11T13:25:13.046485Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-11T13:25:16.336Z\"}}], \"cna\": {\"title\": \"libzvbi conv.c vbi_strndup_iconv_ucs2 integer overflow\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Yariv Nedivi\"}, {\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"ninpwn (VulDB User)\"}, {\"lang\": \"en\", \"type\": \"analyst\", \"value\": \"ninpwn (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 6.9, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 5, \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"libzvbi\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.2.0\"}, {\"status\": \"affected\", \"version\": \"0.2.1\"}, {\"status\": \"affected\", \"version\": \"0.2.2\"}, {\"status\": \"affected\", \"version\": \"0.2.3\"}, {\"status\": \"affected\", \"version\": \"0.2.4\"}, {\"status\": \"affected\", \"version\": \"0.2.5\"}, {\"status\": \"affected\", \"version\": \"0.2.6\"}, {\"status\": \"affected\", \"version\": \"0.2.7\"}, {\"status\": \"affected\", \"version\": \"0.2.8\"}, {\"status\": \"affected\", \"version\": \"0.2.9\"}, {\"status\": \"affected\", \"version\": \"0.2.10\"}, {\"status\": \"affected\", \"version\": \"0.2.11\"}, {\"status\": \"affected\", \"version\": \"0.2.12\"}, {\"status\": \"affected\", \"version\": \"0.2.13\"}, {\"status\": \"affected\", \"version\": \"0.2.14\"}, {\"status\": \"affected\", \"version\": \"0.2.15\"}, {\"status\": \"affected\", \"version\": \"0.2.16\"}, {\"status\": \"affected\", \"version\": \"0.2.17\"}, {\"status\": \"affected\", \"version\": \"0.2.18\"}, {\"status\": \"affected\", \"version\": \"0.2.19\"}, {\"status\": \"affected\", \"version\": \"0.2.20\"}, {\"status\": \"affected\", \"version\": \"0.2.21\"}, {\"status\": \"affected\", \"version\": \"0.2.22\"}, {\"status\": \"affected\", \"version\": \"0.2.23\"}, {\"status\": \"affected\", \"version\": \"0.2.24\"}, {\"status\": \"affected\", \"version\": \"0.2.25\"}, {\"status\": \"affected\", \"version\": \"0.2.26\"}, {\"status\": \"affected\", \"version\": \"0.2.27\"}, {\"status\": \"affected\", \"version\": \"0.2.28\"}, {\"status\": \"affected\", \"version\": \"0.2.29\"}, {\"status\": \"affected\", \"version\": \"0.2.30\"}, {\"status\": \"affected\", \"version\": \"0.2.31\"}, {\"status\": \"affected\", \"version\": \"0.2.32\"}, {\"status\": \"affected\", \"version\": \"0.2.33\"}, {\"status\": \"affected\", \"version\": \"0.2.34\"}, {\"status\": \"affected\", \"version\": \"0.2.35\"}, {\"status\": \"affected\", \"version\": \"0.2.36\"}, {\"status\": \"affected\", \"version\": \"0.2.37\"}, {\"status\": \"affected\", \"version\": \"0.2.38\"}, {\"status\": \"affected\", \"version\": \"0.2.39\"}, {\"status\": \"affected\", \"version\": \"0.2.40\"}, {\"status\": \"affected\", \"version\": \"0.2.41\"}, {\"status\": \"affected\", \"version\": \"0.2.42\"}, {\"status\": \"affected\", \"version\": \"0.2.43\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-03-11T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2025-03-11T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2025-03-11T09:03:47.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.299203\", \"name\": \"VDB-299203 | libzvbi conv.c vbi_strndup_iconv_ucs2 integer overflow\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.299203\", \"name\": \"VDB-299203 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.512800\", \"name\": \"Submit #512800 | Open Source libzvbi 0.2.43 Integer Overflow -\u003e Heap Overflow\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf\", \"tags\": [\"related\"]}, {\"url\": \"https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44\", \"tags\": [\"patch\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.\"}, {\"lang\": \"de\", \"value\": \"In libzvbi bis 0.2.43 wurde eine problematische Schwachstelle ausgemacht. Dabei geht es um die Funktion vbi_strndup_iconv_ucs2 der Datei src/conv.c. Durch die Manipulation des Arguments src_length mit unbekannten Daten kann eine integer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \\u00fcber das Netzwerk erfolgen. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung. Ein Aktualisieren auf die Version 0.2.44 vermag dieses Problem zu l\\u00f6sen. Der Patch wird als ca1672134b3e2962cd392212c73f44f8f4cb489f bezeichnet. Als bestm\\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"Integer Overflow\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-189\", \"description\": \"Numeric Error\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2025-03-11T08:02:35.278Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-2174\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-11T13:40:54.884Z\", \"dateReserved\": \"2025-03-10T17:26:56.285Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2025-03-11T06:31:06.971Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2025:0979-1
Vulnerability from csaf_suse - Published: 2025-03-21 12:54 - Updated: 2025-03-21 12:54Summary
Security update for zvbi
Notes
Title of the patch
Security update for zvbi
Description of the patch
This update for zvbi fixes the following issues:
- CVE-2025-2173: Fixed check on src_length to avoid an unitinialized heap read (bsc#1239222).
- CVE-2025-2174: Fixed integer overflow leading to heap overflow in src/conv.c, src/io-sim.c, src/search.c (bsc#1239299).
- CVE-2025-2175: Fixed integer overflow in _vbi_strndup_iconv (bsc#1239312).
- CVE-2025-2176: Fixed integer overflow in function vbi_capture_sim_load_caption in src/io-sim.c (bsc#1239319).
- CVE-2025-2177: Fixed integer overflow in function vbi_search_new in src/search.c (bsc#1239320).
Patchnames
SUSE-2025-979,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-979,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-979,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-979,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-979,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-979,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-979,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-979,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-979,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-979,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-979,openSUSE-SLE-15.6-2025-979
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for zvbi",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for zvbi fixes the following issues:\n \n - CVE-2025-2173: Fixed check on src_length to avoid an unitinialized heap read (bsc#1239222).\n - CVE-2025-2174: Fixed integer overflow leading to heap overflow in src/conv.c, src/io-sim.c, src/search.c (bsc#1239299).\n - CVE-2025-2175: Fixed integer overflow in _vbi_strndup_iconv (bsc#1239312).\n - CVE-2025-2176: Fixed integer overflow in function vbi_capture_sim_load_caption in src/io-sim.c (bsc#1239319).\n - CVE-2025-2177: Fixed integer overflow in function vbi_search_new in src/search.c (bsc#1239320).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-979,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-979,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-979,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-979,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-979,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-979,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-979,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-979,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-979,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-979,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-979,openSUSE-SLE-15.6-2025-979",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0979-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:0979-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250979-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:0979-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020575.html"
},
{
"category": "self",
"summary": "SUSE Bug 1239222",
"url": "https://bugzilla.suse.com/1239222"
},
{
"category": "self",
"summary": "SUSE Bug 1239299",
"url": "https://bugzilla.suse.com/1239299"
},
{
"category": "self",
"summary": "SUSE Bug 1239312",
"url": "https://bugzilla.suse.com/1239312"
},
{
"category": "self",
"summary": "SUSE Bug 1239319",
"url": "https://bugzilla.suse.com/1239319"
},
{
"category": "self",
"summary": "SUSE Bug 1239320",
"url": "https://bugzilla.suse.com/1239320"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2174 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2177/"
}
],
"title": "Security update for zvbi",
"tracking": {
"current_release_date": "2025-03-21T12:54:02Z",
"generator": {
"date": "2025-03-21T12:54:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:0979-1",
"initial_release_date": "2025-03-21T12:54:02Z",
"revision_history": [
{
"date": "2025-03-21T12:54:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"product": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"product_id": "libzvbi-chains0-0.2.35-150000.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"product": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"product_id": "libzvbi0-0.2.35-150000.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-150000.4.3.1.aarch64",
"product": {
"name": "zvbi-0.2.35-150000.4.3.1.aarch64",
"product_id": "zvbi-0.2.35-150000.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"product": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"product_id": "zvbi-devel-0.2.35-150000.4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-64bit-0.2.35-150000.4.3.1.aarch64_ilp32",
"product": {
"name": "libzvbi-chains0-64bit-0.2.35-150000.4.3.1.aarch64_ilp32",
"product_id": "libzvbi-chains0-64bit-0.2.35-150000.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libzvbi0-64bit-0.2.35-150000.4.3.1.aarch64_ilp32",
"product": {
"name": "libzvbi0-64bit-0.2.35-150000.4.3.1.aarch64_ilp32",
"product_id": "libzvbi0-64bit-0.2.35-150000.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "zvbi-devel-64bit-0.2.35-150000.4.3.1.aarch64_ilp32",
"product": {
"name": "zvbi-devel-64bit-0.2.35-150000.4.3.1.aarch64_ilp32",
"product_id": "zvbi-devel-64bit-0.2.35-150000.4.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.i586",
"product": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.i586",
"product_id": "libzvbi-chains0-0.2.35-150000.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.35-150000.4.3.1.i586",
"product": {
"name": "libzvbi0-0.2.35-150000.4.3.1.i586",
"product_id": "libzvbi0-0.2.35-150000.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-150000.4.3.1.i586",
"product": {
"name": "zvbi-0.2.35-150000.4.3.1.i586",
"product_id": "zvbi-0.2.35-150000.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-150000.4.3.1.i586",
"product": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.i586",
"product_id": "zvbi-devel-0.2.35-150000.4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "zvbi-lang-0.2.35-150000.4.3.1.noarch",
"product": {
"name": "zvbi-lang-0.2.35-150000.4.3.1.noarch",
"product_id": "zvbi-lang-0.2.35-150000.4.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"product": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"product_id": "libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"product": {
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"product_id": "libzvbi0-0.2.35-150000.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-150000.4.3.1.ppc64le",
"product": {
"name": "zvbi-0.2.35-150000.4.3.1.ppc64le",
"product_id": "zvbi-0.2.35-150000.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"product": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"product_id": "zvbi-devel-0.2.35-150000.4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"product": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"product_id": "libzvbi-chains0-0.2.35-150000.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.35-150000.4.3.1.s390x",
"product": {
"name": "libzvbi0-0.2.35-150000.4.3.1.s390x",
"product_id": "libzvbi0-0.2.35-150000.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-150000.4.3.1.s390x",
"product": {
"name": "zvbi-0.2.35-150000.4.3.1.s390x",
"product_id": "zvbi-0.2.35-150000.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-150000.4.3.1.s390x",
"product": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.s390x",
"product_id": "zvbi-devel-0.2.35-150000.4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"product": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"product_id": "libzvbi-chains0-0.2.35-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"product": {
"name": "libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"product_id": "libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"product": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"product_id": "libzvbi0-0.2.35-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"product": {
"name": "libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"product_id": "libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-150000.4.3.1.x86_64",
"product": {
"name": "zvbi-0.2.35-150000.4.3.1.x86_64",
"product_id": "zvbi-0.2.35-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"product": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"product_id": "zvbi-devel-0.2.35-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"product": {
"name": "zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"product_id": "zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.35-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.35-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "zvbi-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64"
},
"product_reference": "zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-lang-0.2.35-150000.4.3.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
},
"product_reference": "zvbi-lang-0.2.35-150000.4.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2173"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2173",
"url": "https://www.suse.com/security/cve/CVE-2025-2173"
},
{
"category": "external",
"summary": "SUSE Bug 1239222 for CVE-2025-2173",
"url": "https://bugzilla.suse.com/1239222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-21T12:54:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-2173"
},
{
"cve": "CVE-2025-2174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2174"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2174",
"url": "https://www.suse.com/security/cve/CVE-2025-2174"
},
{
"category": "external",
"summary": "SUSE Bug 1239299 for CVE-2025-2174",
"url": "https://bugzilla.suse.com/1239299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-21T12:54:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-2174"
},
{
"cve": "CVE-2025-2175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2175"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been rated as problematic. Affected by this issue is the function _vbi_strndup_iconv. The manipulation leads to integer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2175",
"url": "https://www.suse.com/security/cve/CVE-2025-2175"
},
{
"category": "external",
"summary": "SUSE Bug 1239312 for CVE-2025-2175",
"url": "https://bugzilla.suse.com/1239312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-21T12:54:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-2175"
},
{
"cve": "CVE-2025-2176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2176"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as critical has been found in libzvbi up to 0.2.43. This affects the function vbi_capture_sim_load_caption of the file src/io-sim.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The identifier of the patch is ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2176",
"url": "https://www.suse.com/security/cve/CVE-2025-2176"
},
{
"category": "external",
"summary": "SUSE Bug 1239319 for CVE-2025-2176",
"url": "https://bugzilla.suse.com/1239319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-21T12:54:02Z",
"details": "important"
}
],
"title": "CVE-2025-2176"
},
{
"cve": "CVE-2025-2177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2177"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as critical was found in libzvbi up to 0.2.43. This vulnerability affects the function vbi_search_new of the file src/search.c. The manipulation of the argument pat_len leads to integer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2177",
"url": "https://www.suse.com/security/cve/CVE-2025-2177"
},
{
"category": "external",
"summary": "SUSE Bug 1239320 for CVE-2025-2177",
"url": "https://bugzilla.suse.com/1239320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi-chains0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi-chains0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libzvbi0-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libzvbi0-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.s390x",
"openSUSE Leap 15.6:zvbi-devel-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-devel-32bit-0.2.35-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:zvbi-lang-0.2.35-150000.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-21T12:54:02Z",
"details": "important"
}
],
"title": "CVE-2025-2177"
}
]
}
SUSE-SU-2025:0988-1
Vulnerability from csaf_suse - Published: 2025-03-24 09:32 - Updated: 2025-03-24 09:32Summary
Security update for zvbi
Notes
Title of the patch
Security update for zvbi
Description of the patch
This update for zvbi fixes the following issues:
- CVE-2025-2173: Fixed check on src_length to avoid an unitinialized heap read (bsc#1239222).
- CVE-2025-2174: Fixed integer overflow leading to heap overflow in src/conv.c, src/io-sim.c, src/search.c (bsc#1239299).
- CVE-2025-2175: Fixed integer overflow in _vbi_strndup_iconv (bsc#1239312).
- CVE-2025-2176: Fixed integer overflow in function vbi_capture_sim_load_caption in src/io-sim.c (bsc#1239319).
- CVE-2025-2177: Fixed integer overflow in function vbi_search_new in src/search.c (bsc#1239320).
Patchnames
SUSE-2025-988,SUSE-SLE-SERVER-12-SP5-LTSS-2025-988,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-988
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for zvbi",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for zvbi fixes the following issues:\n \n- CVE-2025-2173: Fixed check on src_length to avoid an unitinialized heap read (bsc#1239222).\n- CVE-2025-2174: Fixed integer overflow leading to heap overflow in src/conv.c, src/io-sim.c, src/search.c (bsc#1239299).\n- CVE-2025-2175: Fixed integer overflow in _vbi_strndup_iconv (bsc#1239312).\n- CVE-2025-2176: Fixed integer overflow in function vbi_capture_sim_load_caption in src/io-sim.c (bsc#1239319).\n- CVE-2025-2177: Fixed integer overflow in function vbi_search_new in src/search.c (bsc#1239320).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-988,SUSE-SLE-SERVER-12-SP5-LTSS-2025-988,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-988",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0988-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:0988-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250988-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:0988-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020581.html"
},
{
"category": "self",
"summary": "SUSE Bug 1239222",
"url": "https://bugzilla.suse.com/1239222"
},
{
"category": "self",
"summary": "SUSE Bug 1239299",
"url": "https://bugzilla.suse.com/1239299"
},
{
"category": "self",
"summary": "SUSE Bug 1239312",
"url": "https://bugzilla.suse.com/1239312"
},
{
"category": "self",
"summary": "SUSE Bug 1239319",
"url": "https://bugzilla.suse.com/1239319"
},
{
"category": "self",
"summary": "SUSE Bug 1239320",
"url": "https://bugzilla.suse.com/1239320"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2174 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2177/"
}
],
"title": "Security update for zvbi",
"tracking": {
"current_release_date": "2025-03-24T09:32:22Z",
"generator": {
"date": "2025-03-24T09:32:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:0988-1",
"initial_release_date": "2025-03-24T09:32:22Z",
"revision_history": [
{
"date": "2025-03-24T09:32:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libzvbi0-0.2.35-3.3.1.aarch64",
"product": {
"name": "libzvbi0-0.2.35-3.3.1.aarch64",
"product_id": "libzvbi0-0.2.35-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-3.3.1.aarch64",
"product": {
"name": "zvbi-0.2.35-3.3.1.aarch64",
"product_id": "zvbi-0.2.35-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-3.3.1.aarch64",
"product": {
"name": "zvbi-devel-0.2.35-3.3.1.aarch64",
"product_id": "zvbi-devel-0.2.35-3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi0-64bit-0.2.35-3.3.1.aarch64_ilp32",
"product": {
"name": "libzvbi0-64bit-0.2.35-3.3.1.aarch64_ilp32",
"product_id": "libzvbi0-64bit-0.2.35-3.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "zvbi-devel-64bit-0.2.35-3.3.1.aarch64_ilp32",
"product": {
"name": "zvbi-devel-64bit-0.2.35-3.3.1.aarch64_ilp32",
"product_id": "zvbi-devel-64bit-0.2.35-3.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi0-0.2.35-3.3.1.i586",
"product": {
"name": "libzvbi0-0.2.35-3.3.1.i586",
"product_id": "libzvbi0-0.2.35-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-3.3.1.i586",
"product": {
"name": "zvbi-0.2.35-3.3.1.i586",
"product_id": "zvbi-0.2.35-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-3.3.1.i586",
"product": {
"name": "zvbi-devel-0.2.35-3.3.1.i586",
"product_id": "zvbi-devel-0.2.35-3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi0-0.2.35-3.3.1.ppc64le",
"product": {
"name": "libzvbi0-0.2.35-3.3.1.ppc64le",
"product_id": "libzvbi0-0.2.35-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-3.3.1.ppc64le",
"product": {
"name": "zvbi-0.2.35-3.3.1.ppc64le",
"product_id": "zvbi-0.2.35-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-3.3.1.ppc64le",
"product": {
"name": "zvbi-devel-0.2.35-3.3.1.ppc64le",
"product_id": "zvbi-devel-0.2.35-3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi0-0.2.35-3.3.1.s390",
"product": {
"name": "libzvbi0-0.2.35-3.3.1.s390",
"product_id": "libzvbi0-0.2.35-3.3.1.s390"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-3.3.1.s390",
"product": {
"name": "zvbi-0.2.35-3.3.1.s390",
"product_id": "zvbi-0.2.35-3.3.1.s390"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-3.3.1.s390",
"product": {
"name": "zvbi-devel-0.2.35-3.3.1.s390",
"product_id": "zvbi-devel-0.2.35-3.3.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi0-0.2.35-3.3.1.s390x",
"product": {
"name": "libzvbi0-0.2.35-3.3.1.s390x",
"product_id": "libzvbi0-0.2.35-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libzvbi0-32bit-0.2.35-3.3.1.s390x",
"product": {
"name": "libzvbi0-32bit-0.2.35-3.3.1.s390x",
"product_id": "libzvbi0-32bit-0.2.35-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-3.3.1.s390x",
"product": {
"name": "zvbi-0.2.35-3.3.1.s390x",
"product_id": "zvbi-0.2.35-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-3.3.1.s390x",
"product": {
"name": "zvbi-devel-0.2.35-3.3.1.s390x",
"product_id": "zvbi-devel-0.2.35-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-devel-32bit-0.2.35-3.3.1.s390x",
"product": {
"name": "zvbi-devel-32bit-0.2.35-3.3.1.s390x",
"product_id": "zvbi-devel-32bit-0.2.35-3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi0-0.2.35-3.3.1.x86_64",
"product": {
"name": "libzvbi0-0.2.35-3.3.1.x86_64",
"product_id": "libzvbi0-0.2.35-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzvbi0-32bit-0.2.35-3.3.1.x86_64",
"product": {
"name": "libzvbi0-32bit-0.2.35-3.3.1.x86_64",
"product_id": "libzvbi0-32bit-0.2.35-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.35-3.3.1.x86_64",
"product": {
"name": "zvbi-0.2.35-3.3.1.x86_64",
"product_id": "zvbi-0.2.35-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.35-3.3.1.x86_64",
"product": {
"name": "zvbi-devel-0.2.35-3.3.1.x86_64",
"product_id": "zvbi-devel-0.2.35-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-32bit-0.2.35-3.3.1.x86_64",
"product": {
"name": "zvbi-devel-32bit-0.2.35-3.3.1.x86_64",
"product_id": "zvbi-devel-32bit-0.2.35-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-3.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64"
},
"product_reference": "libzvbi0-0.2.35-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.35-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-3.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x"
},
"product_reference": "libzvbi0-0.2.35-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-3.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64"
},
"product_reference": "zvbi-devel-0.2.35-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le"
},
"product_reference": "zvbi-devel-0.2.35-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-3.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x"
},
"product_reference": "zvbi-devel-0.2.35-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64"
},
"product_reference": "zvbi-devel-0.2.35-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.35-3.3.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64"
},
"product_reference": "libzvbi0-0.2.35-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.35-3.3.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
},
"product_reference": "zvbi-devel-0.2.35-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2173"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2173",
"url": "https://www.suse.com/security/cve/CVE-2025-2173"
},
{
"category": "external",
"summary": "SUSE Bug 1239222 for CVE-2025-2173",
"url": "https://bugzilla.suse.com/1239222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-24T09:32:22Z",
"details": "moderate"
}
],
"title": "CVE-2025-2173"
},
{
"cve": "CVE-2025-2174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2174"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2174",
"url": "https://www.suse.com/security/cve/CVE-2025-2174"
},
{
"category": "external",
"summary": "SUSE Bug 1239299 for CVE-2025-2174",
"url": "https://bugzilla.suse.com/1239299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-24T09:32:22Z",
"details": "moderate"
}
],
"title": "CVE-2025-2174"
},
{
"cve": "CVE-2025-2175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2175"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been rated as problematic. Affected by this issue is the function _vbi_strndup_iconv. The manipulation leads to integer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2175",
"url": "https://www.suse.com/security/cve/CVE-2025-2175"
},
{
"category": "external",
"summary": "SUSE Bug 1239312 for CVE-2025-2175",
"url": "https://bugzilla.suse.com/1239312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-24T09:32:22Z",
"details": "moderate"
}
],
"title": "CVE-2025-2175"
},
{
"cve": "CVE-2025-2176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2176"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as critical has been found in libzvbi up to 0.2.43. This affects the function vbi_capture_sim_load_caption of the file src/io-sim.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The identifier of the patch is ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2176",
"url": "https://www.suse.com/security/cve/CVE-2025-2176"
},
{
"category": "external",
"summary": "SUSE Bug 1239319 for CVE-2025-2176",
"url": "https://bugzilla.suse.com/1239319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-24T09:32:22Z",
"details": "important"
}
],
"title": "CVE-2025-2176"
},
{
"cve": "CVE-2025-2177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2177"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as critical was found in libzvbi up to 0.2.43. This vulnerability affects the function vbi_search_new of the file src/search.c. The manipulation of the argument pat_len leads to integer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2177",
"url": "https://www.suse.com/security/cve/CVE-2025-2177"
},
{
"category": "external",
"summary": "SUSE Bug 1239320 for CVE-2025-2177",
"url": "https://bugzilla.suse.com/1239320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:zvbi-devel-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libzvbi0-0.2.35-3.3.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:zvbi-devel-0.2.35-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-24T09:32:22Z",
"details": "important"
}
],
"title": "CVE-2025-2177"
}
]
}
OPENSUSE-SU-2025:14891-1
Vulnerability from csaf_opensuse - Published: 2025-03-13 00:00 - Updated: 2025-03-13 00:00Summary
libzvbi-chains0-0.2.44-1.1 on GA media
Notes
Title of the patch
libzvbi-chains0-0.2.44-1.1 on GA media
Description of the patch
These are all security issues fixed in the libzvbi-chains0-0.2.44-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14891
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libzvbi-chains0-0.2.44-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libzvbi-chains0-0.2.44-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14891",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14891-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14891-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFNCETNVIFNZJ7PHLDDOO6PDYU27Q6MM/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14891-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFNCETNVIFNZJ7PHLDDOO6PDYU27Q6MM/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2174 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2177/"
}
],
"title": "libzvbi-chains0-0.2.44-1.1 on GA media",
"tracking": {
"current_release_date": "2025-03-13T00:00:00Z",
"generator": {
"date": "2025-03-13T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14891-1",
"initial_release_date": "2025-03-13T00:00:00Z",
"revision_history": [
{
"date": "2025-03-13T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.44-1.1.aarch64",
"product": {
"name": "libzvbi-chains0-0.2.44-1.1.aarch64",
"product_id": "libzvbi-chains0-0.2.44-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"product": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"product_id": "libzvbi-chains0-32bit-0.2.44-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.44-1.1.aarch64",
"product": {
"name": "libzvbi0-0.2.44-1.1.aarch64",
"product_id": "libzvbi0-0.2.44-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libzvbi0-32bit-0.2.44-1.1.aarch64",
"product": {
"name": "libzvbi0-32bit-0.2.44-1.1.aarch64",
"product_id": "libzvbi0-32bit-0.2.44-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.44-1.1.aarch64",
"product": {
"name": "zvbi-0.2.44-1.1.aarch64",
"product_id": "zvbi-0.2.44-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.44-1.1.aarch64",
"product": {
"name": "zvbi-devel-0.2.44-1.1.aarch64",
"product_id": "zvbi-devel-0.2.44-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-32bit-0.2.44-1.1.aarch64",
"product": {
"name": "zvbi-devel-32bit-0.2.44-1.1.aarch64",
"product_id": "zvbi-devel-32bit-0.2.44-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "zvbi-lang-0.2.44-1.1.aarch64",
"product": {
"name": "zvbi-lang-0.2.44-1.1.aarch64",
"product_id": "zvbi-lang-0.2.44-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.44-1.1.ppc64le",
"product": {
"name": "libzvbi-chains0-0.2.44-1.1.ppc64le",
"product_id": "libzvbi-chains0-0.2.44-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"product": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"product_id": "libzvbi-chains0-32bit-0.2.44-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.44-1.1.ppc64le",
"product": {
"name": "libzvbi0-0.2.44-1.1.ppc64le",
"product_id": "libzvbi0-0.2.44-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libzvbi0-32bit-0.2.44-1.1.ppc64le",
"product": {
"name": "libzvbi0-32bit-0.2.44-1.1.ppc64le",
"product_id": "libzvbi0-32bit-0.2.44-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.44-1.1.ppc64le",
"product": {
"name": "zvbi-0.2.44-1.1.ppc64le",
"product_id": "zvbi-0.2.44-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.44-1.1.ppc64le",
"product": {
"name": "zvbi-devel-0.2.44-1.1.ppc64le",
"product_id": "zvbi-devel-0.2.44-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"product": {
"name": "zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"product_id": "zvbi-devel-32bit-0.2.44-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zvbi-lang-0.2.44-1.1.ppc64le",
"product": {
"name": "zvbi-lang-0.2.44-1.1.ppc64le",
"product_id": "zvbi-lang-0.2.44-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.44-1.1.s390x",
"product": {
"name": "libzvbi-chains0-0.2.44-1.1.s390x",
"product_id": "libzvbi-chains0-0.2.44-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"product": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"product_id": "libzvbi-chains0-32bit-0.2.44-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.44-1.1.s390x",
"product": {
"name": "libzvbi0-0.2.44-1.1.s390x",
"product_id": "libzvbi0-0.2.44-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libzvbi0-32bit-0.2.44-1.1.s390x",
"product": {
"name": "libzvbi0-32bit-0.2.44-1.1.s390x",
"product_id": "libzvbi0-32bit-0.2.44-1.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.44-1.1.s390x",
"product": {
"name": "zvbi-0.2.44-1.1.s390x",
"product_id": "zvbi-0.2.44-1.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.44-1.1.s390x",
"product": {
"name": "zvbi-devel-0.2.44-1.1.s390x",
"product_id": "zvbi-devel-0.2.44-1.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-devel-32bit-0.2.44-1.1.s390x",
"product": {
"name": "zvbi-devel-32bit-0.2.44-1.1.s390x",
"product_id": "zvbi-devel-32bit-0.2.44-1.1.s390x"
}
},
{
"category": "product_version",
"name": "zvbi-lang-0.2.44-1.1.s390x",
"product": {
"name": "zvbi-lang-0.2.44-1.1.s390x",
"product_id": "zvbi-lang-0.2.44-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libzvbi-chains0-0.2.44-1.1.x86_64",
"product": {
"name": "libzvbi-chains0-0.2.44-1.1.x86_64",
"product_id": "libzvbi-chains0-0.2.44-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"product": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"product_id": "libzvbi-chains0-32bit-0.2.44-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzvbi0-0.2.44-1.1.x86_64",
"product": {
"name": "libzvbi0-0.2.44-1.1.x86_64",
"product_id": "libzvbi0-0.2.44-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzvbi0-32bit-0.2.44-1.1.x86_64",
"product": {
"name": "libzvbi0-32bit-0.2.44-1.1.x86_64",
"product_id": "libzvbi0-32bit-0.2.44-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-0.2.44-1.1.x86_64",
"product": {
"name": "zvbi-0.2.44-1.1.x86_64",
"product_id": "zvbi-0.2.44-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-0.2.44-1.1.x86_64",
"product": {
"name": "zvbi-devel-0.2.44-1.1.x86_64",
"product_id": "zvbi-devel-0.2.44-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-devel-32bit-0.2.44-1.1.x86_64",
"product": {
"name": "zvbi-devel-32bit-0.2.44-1.1.x86_64",
"product_id": "zvbi-devel-32bit-0.2.44-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "zvbi-lang-0.2.44-1.1.x86_64",
"product": {
"name": "zvbi-lang-0.2.44-1.1.x86_64",
"product_id": "zvbi-lang-0.2.44-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64"
},
"product_reference": "libzvbi-chains0-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le"
},
"product_reference": "libzvbi-chains0-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x"
},
"product_reference": "libzvbi-chains0-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64"
},
"product_reference": "libzvbi-chains0-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64"
},
"product_reference": "libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le"
},
"product_reference": "libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x"
},
"product_reference": "libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi-chains0-32bit-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64"
},
"product_reference": "libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64"
},
"product_reference": "libzvbi0-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le"
},
"product_reference": "libzvbi0-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x"
},
"product_reference": "libzvbi0-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64"
},
"product_reference": "libzvbi0-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-32bit-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64"
},
"product_reference": "libzvbi0-32bit-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-32bit-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le"
},
"product_reference": "libzvbi0-32bit-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-32bit-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x"
},
"product_reference": "libzvbi0-32bit-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzvbi0-32bit-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64"
},
"product_reference": "libzvbi0-32bit-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64"
},
"product_reference": "zvbi-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le"
},
"product_reference": "zvbi-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x"
},
"product_reference": "zvbi-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64"
},
"product_reference": "zvbi-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64"
},
"product_reference": "zvbi-devel-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le"
},
"product_reference": "zvbi-devel-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x"
},
"product_reference": "zvbi-devel-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64"
},
"product_reference": "zvbi-devel-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-32bit-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64"
},
"product_reference": "zvbi-devel-32bit-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-32bit-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le"
},
"product_reference": "zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-32bit-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x"
},
"product_reference": "zvbi-devel-32bit-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-devel-32bit-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64"
},
"product_reference": "zvbi-devel-32bit-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-lang-0.2.44-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64"
},
"product_reference": "zvbi-lang-0.2.44-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-lang-0.2.44-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le"
},
"product_reference": "zvbi-lang-0.2.44-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-lang-0.2.44-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x"
},
"product_reference": "zvbi-lang-0.2.44-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zvbi-lang-0.2.44-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
},
"product_reference": "zvbi-lang-0.2.44-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2173"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2173",
"url": "https://www.suse.com/security/cve/CVE-2025-2173"
},
{
"category": "external",
"summary": "SUSE Bug 1239222 for CVE-2025-2173",
"url": "https://bugzilla.suse.com/1239222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-2173"
},
{
"cve": "CVE-2025-2174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2174"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2174",
"url": "https://www.suse.com/security/cve/CVE-2025-2174"
},
{
"category": "external",
"summary": "SUSE Bug 1239299 for CVE-2025-2174",
"url": "https://bugzilla.suse.com/1239299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-2174"
},
{
"cve": "CVE-2025-2175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2175"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libzvbi up to 0.2.43. It has been rated as problematic. Affected by this issue is the function _vbi_strndup_iconv. The manipulation leads to integer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2175",
"url": "https://www.suse.com/security/cve/CVE-2025-2175"
},
{
"category": "external",
"summary": "SUSE Bug 1239312 for CVE-2025-2175",
"url": "https://bugzilla.suse.com/1239312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-2175"
},
{
"cve": "CVE-2025-2176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2176"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as critical has been found in libzvbi up to 0.2.43. This affects the function vbi_capture_sim_load_caption of the file src/io-sim.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The identifier of the patch is ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2176",
"url": "https://www.suse.com/security/cve/CVE-2025-2176"
},
{
"category": "external",
"summary": "SUSE Bug 1239319 for CVE-2025-2176",
"url": "https://bugzilla.suse.com/1239319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-2176"
},
{
"cve": "CVE-2025-2177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2177"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as critical was found in libzvbi up to 0.2.43. This vulnerability affects the function vbi_search_new of the file src/search.c. The manipulation of the argument pat_len leads to integer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2177",
"url": "https://www.suse.com/security/cve/CVE-2025-2177"
},
{
"category": "external",
"summary": "SUSE Bug 1239320 for CVE-2025-2177",
"url": "https://bugzilla.suse.com/1239320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi-chains0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:libzvbi0-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-devel-32bit-0.2.44-1.1.x86_64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.aarch64",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.ppc64le",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.s390x",
"openSUSE Tumbleweed:zvbi-lang-0.2.44-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-2177"
}
]
}
GHSA-2GQQ-G5XG-QR37
Vulnerability from github – Published: 2025-03-11 09:30 – Updated: 2025-03-11 09:30
VLAI?
Details
A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
Severity ?
5.3 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-2174"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-11T07:15:36Z",
"severity": "MODERATE"
},
"details": "A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.",
"id": "GHSA-2gqq-g5xg-qr37",
"modified": "2025-03-11T09:30:30Z",
"published": "2025-03-11T09:30:30Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2174"
},
{
"type": "WEB",
"url": "https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f"
},
{
"type": "WEB",
"url": "https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.299203"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.299203"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.512800"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
FKIE_CVE-2025-2174
Vulnerability from fkie_nvd - Published: 2025-03-11 07:15 - Updated: 2025-10-03 00:25
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
References
| URL | Tags | ||
|---|---|---|---|
| cna@vuldb.com | https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f | Patch | |
| cna@vuldb.com | https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44 | Release Notes | |
| cna@vuldb.com | https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf | Patch, Vendor Advisory | |
| cna@vuldb.com | https://vuldb.com/?ctiid.299203 | Permissions Required, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?id.299203 | Third Party Advisory, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?submit.512800 | Third Party Advisory, VDB Entry |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| zapping-vbi | zvbi | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zapping-vbi:zvbi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A797D3C-8334-46CA-9503-C6B145649870",
"versionEndExcluding": "0.2.44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en libzvbi hasta la versi\u00f3n 0.2.43. Se ha declarado como problem\u00e1tica. La funci\u00f3n vbi_strndup_iconv_ucs2 del archivo src/conv.c est\u00e1 afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento src_length provoca un desbordamiento de enteros. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y se puede utilizar. La actualizaci\u00f3n a la versi\u00f3n 0.2.44 puede solucionar este problema. El parche se llama ca1672134b3e2962cd392212c73f44f8f4cb489f. Se recomienda actualizar el componente afectado. La responsable del c\u00f3digo fue informada de antemano sobre los problemas. Reaccion\u00f3 muy r\u00e1pido y con gran profesionalidad."
}
],
"id": "CVE-2025-2174",
"lastModified": "2025-10-03T00:25:40.883",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
},
"published": "2025-03-11T07:15:36.887",
"references": [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.299203"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.299203"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.512800"
}
],
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
},
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…