Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2025.0121
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2025-0121)
Summary:The remote host is missing an update for the 'zvbi' package(s) announced via the MGASA-2025-0121 advisory.
Description:Summary:
The remote host is missing an update for the 'zvbi' package(s) announced via the MGASA-2025-0121 advisory.

Vulnerability Insight:
A vulnerability was found in libzvbi up to 0.2.43. It has been
classified as problematic. Affected is the function
vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the
argument src_length leads to uninitialized pointer. It is possible to
launch the attack remotely. The exploit has been disclosed to the public
and may be used. Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2173).
A vulnerability classified as critical has been found in libzvbi up to
0.2.43. This affects the function vbi_capture_sim_load_caption of the
file src/io-sim.c. The manipulation leads to integer overflow. It is
possible to initiate the attack remotely. The exploit has been disclosed
to the public and may be used. Upgrading to version 0.2.44 is able to
address this issue(A vulnerability classified as critical has been found
in libzvbi up to 0.2.43. This affects the function
vbi_capture_sim_load_caption of the file src/io-sim.c. The manipulation
leads to integer overflow. It is possible to initiate the attack
remotely. The exploit has been disclosed to the public and may be used.
Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2176).
A vulnerability was found in libzvbi up to 0.2.43. It has been rated as
problematic. Affected by this issue is the function _vbi_strndup_iconv.
The manipulation leads to integer overflow. The attack may be launched
remotely. The exploit has been disclosed to the public and may be used.
Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2175).
A vulnerability classified as critical was found in libzvbi up to
0.2.43. This vulnerability affects the function vbi_search_new of the
file src/search.c. The manipulation of the argument pat_len leads to
integer overflow. The attack can be initiated remotely. The exploit has
been disclosed to the public and may be used. Upgrading to version
0.2.44 is able to address this issue (CVE-2025-2177)
A vulnerability was found in libzvbi up to 0.2.43. It has been declared
as problematic. Affected by this vulnerability is the function
vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the
argument src_length leads to integer overflow. The attack can be
launched remotely. The exploit has been disclosed to the public and may
be used. Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2174).

Affected Software/OS:
'zvbi' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2025-2173
Common Vulnerability Exposure (CVE) ID: CVE-2025-2174
Common Vulnerability Exposure (CVE) ID: CVE-2025-2175
Common Vulnerability Exposure (CVE) ID: CVE-2025-2176
Common Vulnerability Exposure (CVE) ID: CVE-2025-2177
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.