Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-m229-g3dn-pbbg
SummaryIn libavif before 1.3.0, makeRoom in stream.c has an integer overflow and resultant buffer overflow in stream->offset+size.
Aliases
0
alias CVE-2025-48174
Fixed_packages
0
url pkg:deb/debian/libavif@0.8.4-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libavif@0.8.4-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@0.8.4-2%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/libavif@0.8.4-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libavif@0.8.4-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@0.8.4-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libavif@0.11.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libavif@0.11.1-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@0.11.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libavif@0.11.1-1%2Bdeb12u1
purl pkg:deb/debian/libavif@0.11.1-1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@0.11.1-1%252Bdeb12u1
4
url pkg:deb/debian/libavif@1.2.1-1.1?distro=trixie
purl pkg:deb/debian/libavif@1.2.1-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@1.2.1-1.1%3Fdistro=trixie
5
url pkg:deb/debian/libavif@1.2.1-1.2?distro=trixie
purl pkg:deb/debian/libavif@1.2.1-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@1.2.1-1.2%3Fdistro=trixie
6
url pkg:deb/debian/libavif@1.4.1-1?distro=trixie
purl pkg:deb/debian/libavif@1.4.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@1.4.1-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/libavif@0.8.4-2%2Bdeb11u1
purl pkg:deb/debian/libavif@0.8.4-2%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m229-g3dn-pbbg
1
vulnerability VCID-vpe9-3csn-vyf1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libavif@0.8.4-2%252Bdeb11u1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-48174
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.5833
published_at 2026-04-21T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-02T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58308
published_at 2026-04-04T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-07T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58336
published_at 2026-04-08T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58342
published_at 2026-04-09T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.5836
published_at 2026-04-11T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58337
published_at 2026-04-12T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58317
published_at 2026-04-13T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58349
published_at 2026-04-16T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58353
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-48174
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48174
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105885
reference_id 1105885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105885
4
reference_url https://github.com/AOMediaCodec/libavif/pull/2768
reference_id 2768
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T13:25:39Z/
url https://github.com/AOMediaCodec/libavif/pull/2768
5
reference_url https://github.com/AOMediaCodec/libavif/commit/50a743062938a3828581d725facc9c2b92a1d109
reference_id 50a743062938a3828581d725facc9c2b92a1d109
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T13:25:39Z/
url https://github.com/AOMediaCodec/libavif/commit/50a743062938a3828581d725facc9c2b92a1d109
6
reference_url https://github.com/AOMediaCodec/libavif/commit/c9f1bea437f21cb78f9919c332922a3b0ba65e11
reference_id c9f1bea437f21cb78f9919c332922a3b0ba65e11
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T13:25:39Z/
url https://github.com/AOMediaCodec/libavif/commit/c9f1bea437f21cb78f9919c332922a3b0ba65e11
7
reference_url https://github.com/AOMediaCodec/libavif/commit/e5fdefe7d1776e6c4cf1703c163a8c0535599029
reference_id e5fdefe7d1776e6c4cf1703c163a8c0535599029
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T13:25:39Z/
url https://github.com/AOMediaCodec/libavif/commit/e5fdefe7d1776e6c4cf1703c163a8c0535599029
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score4.5 - 6.8
Exploitability0.5
Weighted_severity4.0
Risk_score2.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-m229-g3dn-pbbg