First published: Mon Mar 24 2025(Updated: )
It was discovered that zvbi incorrectly handled memory when processing user input. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libzvbi0t64 | <0.2.42-2ubuntu0.24.10.2 | 0.2.42-2ubuntu0.24.10.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/zvbi | <0.2.42-2ubuntu0.24.10.2 | 0.2.42-2ubuntu0.24.10.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/libzvbi0t64 | <0.2.42-2ubuntu0.24.04.1~esm1 | 0.2.42-2ubuntu0.24.04.1~esm1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/zvbi | <0.2.42-2ubuntu0.24.04.1~esm1 | 0.2.42-2ubuntu0.24.04.1~esm1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libzvbi0 | <0.2.35-19ubuntu0.1~esm1 | 0.2.35-19ubuntu0.1~esm1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/zvbi | <0.2.35-19ubuntu0.1~esm1 | 0.2.35-19ubuntu0.1~esm1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libzvbi0 | <0.2.35-17ubuntu0.1~esm1 | 0.2.35-17ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/zvbi | <0.2.35-17ubuntu0.1~esm1 | 0.2.35-17ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libzvbi0 | <0.2.35-13ubuntu0.1~esm1 | 0.2.35-13ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/zvbi | <0.2.35-13ubuntu0.1~esm1 | 0.2.35-13ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libzvbi0 | <0.2.35-10ubuntu0.1~esm1 | 0.2.35-10ubuntu0.1~esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/zvbi | <0.2.35-10ubuntu0.1~esm1 | 0.2.35-10ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7367-1 is significant, as it allows for potential denial of service and arbitrary code execution.
To fix USN-7367-1, you should update to the appropriate patched version of the vulnerable packages provided by Ubuntu.
USN-7367-1 affects multiple versions of the libzvbi0 and zvbi packages across Ubuntu 24.10, 24.04, 22.04, 20.04, 18.04, and 16.04.
Yes, USN-7367-1 can potentially be exploited remotely through crafted user input.
If immediate updates are not possible for USN-7367-1, consider implementing network-level protections to mitigate potential exploitation.