VULNERABILITY

SUSE: CVE-2025-2173: SUSE Linux Security Advisory

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

SUSE: CVE-2025-2173: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
03/11/2025
Created
03/25/2025
Added
03/24/2025
Modified
04/02/2025

Description

A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.

Solution(s)

  • suse-upgrade-libzvbi-chains0
  • suse-upgrade-libzvbi-chains0-32bit
  • suse-upgrade-libzvbi0
  • suse-upgrade-libzvbi0-32bit
  • suse-upgrade-zvbi
  • suse-upgrade-zvbi-devel
  • suse-upgrade-zvbi-devel-32bit
  • suse-upgrade-zvbi-lang

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;