CVE-2025-11961

Name
CVE-2025-11961
Description
pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
patch https://github.com/the-tcpdump-group/libpcap/commit/b2d2f9a9a0581c40780bde509f7cc715920f1c02

Match rules

CPE URI Source package Min version Max version
libpcap >= 0 < 1.10.6

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libpcap edge-main 1.10.5-r1 Celeste <cielesti@protonmail.com> possibly vulnerable
libpcap edge-main 1.10.5-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
libpcap edge-main 1.9.1-r0 None possibly vulnerable
libpcap 3.23-main 1.10.5-r1 Celeste <cielesti@protonmail.com> possibly vulnerable
libpcap 3.22-main 1.10.5-r1 Celeste <cielesti@protonmail.com> possibly vulnerable
libpcap 3.22-main 1.9.1-r0 None possibly vulnerable
libpcap 3.21-main 1.10.5-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
libpcap 3.21-main 1.9.1-r0 None possibly vulnerable
libpcap 3.20-main 1.10.4-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
libpcap 3.20-main 1.9.1-r0 None possibly vulnerable
libpcap 3.19-main 1.10.4-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
libpcap 3.19-main 1.9.1-r0 None possibly vulnerable