File _patchinfo of Package patchinfo.37835
<patchinfo incident="37835">
<issue tracker="cve" id="2025-2173"/>
<issue tracker="cve" id="2025-2174"/>
<issue tracker="cve" id="2025-2176"/>
<issue tracker="cve" id="2025-2177"/>
<issue tracker="cve" id="2025-2175"/>
<issue tracker="bnc" id="1239320">VUL-0: CVE-2025-2177: zvbi: vulnerability affects the function vbi_search_new of the file src/search.c</issue>
<issue tracker="bnc" id="1239222">VUL-0: CVE-2025-2173: zvbi: src/conv.c: Check src_length to avoid an unitinialized heap read</issue>
<issue tracker="bnc" id="1239299">VUL-0: CVE-2025-2174: zvbi: Avoid integer overflow leading to heap overflow in src/conv.c, src/io-sim.c, src/search.c</issue>
<issue tracker="bnc" id="1239312">VUL-0: CVE-2025-2175: zvbi: integer overflow in _vbi_strndup_iconv</issue>
<issue tracker="bnc" id="1239319">VUL-0: CVE-2025-2176: zvbi: Avoid integer overflow leading to heap overflow in src/conv.c, src/io-sim.c, src/search.c</issue>
<packager>pgajdos</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for zvbi</summary>
<description>This update for zvbi fixes the following issues:
- CVE-2025-2173: Fixed check on src_length to avoid an unitinialized heap read (bsc#1239222).
- CVE-2025-2174: Fixed integer overflow leading to heap overflow in src/conv.c, src/io-sim.c, src/search.c (bsc#1239299).
- CVE-2025-2175: Fixed integer overflow in _vbi_strndup_iconv (bsc#1239312).
- CVE-2025-2176: Fixed integer overflow in function vbi_capture_sim_load_caption in src/io-sim.c (bsc#1239319).
- CVE-2025-2177: Fixed integer overflow in function vbi_search_new in src/search.c (bsc#1239320).
</description>
</patchinfo>