Skip to content

Commit a07873c

Browse files
Advisory Database Sync
1 parent 56ee222 commit a07873c

File tree

106 files changed

+1537
-305
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+1537
-305
lines changed

advisories/unreviewed/2025/03/GHSA-22cf-67wm-xj29/GHSA-22cf-67wm-xj29.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-22cf-67wm-xj29",
4-
"modified": "2025-04-18T15:31:34Z",
4+
"modified": "2025-12-12T18:30:27Z",
55
"published": "2025-03-03T03:31:18Z",
66
"aliases": [
77
"CVE-2025-25951"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2025-25951"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2025-25951"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/03/GHSA-27hr-9v6h-xmx3/GHSA-27hr-9v6h-xmx3.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-27hr-9v6h-xmx3",
4-
"modified": "2025-04-18T15:31:35Z",
4+
"modified": "2025-12-12T18:30:27Z",
55
"published": "2025-03-03T03:31:18Z",
66
"aliases": [
77
"CVE-2025-25952"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2025-25952"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2025-25952"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/03/GHSA-44rm-j4gx-rrg2/GHSA-44rm-j4gx-rrg2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-44rm-j4gx-rrg2",
4-
"modified": "2025-04-18T15:31:34Z",
4+
"modified": "2025-12-12T18:30:27Z",
55
"published": "2025-03-03T03:31:18Z",
66
"aliases": [
77
"CVE-2025-25950"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2025-25950"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2025-25950"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/03/GHSA-634g-m7q6-xphf/GHSA-634g-m7q6-xphf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-634g-m7q6-xphf",
4-
"modified": "2025-04-18T15:31:35Z",
4+
"modified": "2025-12-12T18:30:27Z",
55
"published": "2025-03-03T03:31:18Z",
66
"aliases": [
77
"CVE-2025-25953"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2025-25953"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2025-25953"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/03/GHSA-m8x3-4xx7-hm4v/GHSA-m8x3-4xx7-hm4v.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m8x3-4xx7-hm4v",
4-
"modified": "2025-04-18T15:31:34Z",
4+
"modified": "2025-12-12T18:30:27Z",
55
"published": "2025-03-03T03:31:17Z",
66
"aliases": [
77
"CVE-2025-25949"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2025-25949"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2025-25949"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/03/GHSA-q269-fjx3-x255/GHSA-q269-fjx3-x255.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q269-fjx3-x255",
4-
"modified": "2025-04-18T15:31:34Z",
4+
"modified": "2025-12-12T18:30:27Z",
55
"published": "2025-03-03T03:31:18Z",
66
"aliases": [
77
"CVE-2025-25948"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2025-25948"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2025-25948"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/04/GHSA-vmqv-3858-9wp7/GHSA-vmqv-3858-9wp7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vmqv-3858-9wp7",
4-
"modified": "2025-04-26T15:30:31Z",
4+
"modified": "2025-12-12T18:30:27Z",
55
"published": "2025-04-26T15:30:31Z",
66
"aliases": [
77
"CVE-2024-53636"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2024-53636"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2024-53636"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2025/09/GHSA-29x7-qr43-qqmw/GHSA-29x7-qr43-qqmw.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-29x7-qr43-qqmw",
4-
"modified": "2025-09-17T15:30:39Z",
4+
"modified": "2025-12-12T18:30:28Z",
55
"published": "2025-09-17T15:30:39Z",
66
"aliases": [
77
"CVE-2023-53365"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6mr: Fix skb_under_panic in ip6mr_cache_report()\n\nskbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4\n head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg\n ------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:192!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: ipv6_addrconf addrconf_dad_work\n RIP: 0010:skb_panic+0x152/0x1d0\n Call Trace:\n <TASK>\n skb_push+0xc4/0xe0\n ip6mr_cache_report+0xd69/0x19b0\n reg_vif_xmit+0x406/0x690\n dev_hard_start_xmit+0x17e/0x6e0\n __dev_queue_xmit+0x2d6a/0x3d20\n vlan_dev_hard_start_xmit+0x3ab/0x5c0\n dev_hard_start_xmit+0x17e/0x6e0\n __dev_queue_xmit+0x2d6a/0x3d20\n neigh_connected_output+0x3ed/0x570\n ip6_finish_output2+0x5b5/0x1950\n ip6_finish_output+0x693/0x11c0\n ip6_output+0x24b/0x880\n NF_HOOK.constprop.0+0xfd/0x530\n ndisc_send_skb+0x9db/0x1400\n ndisc_send_rs+0x12a/0x6c0\n addrconf_dad_completed+0x3c9/0xea0\n addrconf_dad_work+0x849/0x1420\n process_one_work+0xa22/0x16e0\n worker_thread+0x679/0x10c0\n ret_from_fork+0x28/0x60\n ret_from_fork_asm+0x11/0x20\n\nWhen setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().\nreg_vif_xmit()\n ip6mr_cache_report()\n skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4\nAnd skb_push declared as:\n\tvoid *skb_push(struct sk_buff *skb, unsigned int len);\n\t\tskb->data -= len;\n\t\t//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850\nskb->data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -49,7 +54,7 @@
4954
],
5055
"database_specific": {
5156
"cwe_ids": [],
52-
"severity": null,
57+
"severity": "MODERATE",
5358
"github_reviewed": false,
5459
"github_reviewed_at": null,
5560
"nvd_published_at": "2025-09-17T15:15:40Z"

advisories/unreviewed/2025/09/GHSA-2h3h-p2mp-rw5q/GHSA-2h3h-p2mp-rw5q.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2h3h-p2mp-rw5q",
4-
"modified": "2025-09-18T15:30:34Z",
4+
"modified": "2025-12-12T18:30:28Z",
55
"published": "2025-09-18T15:30:34Z",
66
"aliases": [
77
"CVE-2023-53377"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: prevent use-after-free by freeing the cfile later\n\nIn smb2_compound_op we have a possible use-after-free\nwhich can cause hard to debug problems later on.\n\nThis was revealed during stress testing with KASAN enabled\nkernel. Fixing it by moving the cfile free call to\na few lines below, after the usage.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -32,8 +37,10 @@
3237
}
3338
],
3439
"database_specific": {
35-
"cwe_ids": [],
36-
"severity": null,
40+
"cwe_ids": [
41+
"CWE-416"
42+
],
43+
"severity": "HIGH",
3744
"github_reviewed": false,
3845
"github_reviewed_at": null,
3946
"nvd_published_at": "2025-09-18T14:15:40Z"

advisories/unreviewed/2025/09/GHSA-2j59-jjwx-7c79/GHSA-2j59-jjwx-7c79.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2j59-jjwx-7c79",
4-
"modified": "2025-09-17T15:30:39Z",
4+
"modified": "2025-12-12T18:30:28Z",
55
"published": "2025-09-17T15:30:39Z",
66
"aliases": [
77
"CVE-2023-53363"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix use-after-free in pci_bus_release_domain_nr()\n\nCommit c14f7ccc9f5d (\"PCI: Assign PCI domain IDs by ida_alloc()\")\nintroduced a use-after-free bug in the bus removal cleanup. The issue was\nfound with kfence:\n\n [ 19.293351] BUG: KFENCE: use-after-free read in pci_bus_release_domain_nr+0x10/0x70\n\n [ 19.302817] Use-after-free read at 0x000000007f3b80eb (in kfence-#115):\n [ 19.309677] pci_bus_release_domain_nr+0x10/0x70\n [ 19.309691] dw_pcie_host_deinit+0x28/0x78\n [ 19.309702] tegra_pcie_deinit_controller+0x1c/0x38 [pcie_tegra194]\n [ 19.309734] tegra_pcie_dw_probe+0x648/0xb28 [pcie_tegra194]\n [ 19.309752] platform_probe+0x90/0xd8\n ...\n\n [ 19.311457] kfence-#115: 0x00000000063a155a-0x00000000ba698da8, size=1072, cache=kmalloc-2k\n\n [ 19.311469] allocated by task 96 on cpu 10 at 19.279323s:\n [ 19.311562] __kmem_cache_alloc_node+0x260/0x278\n [ 19.311571] kmalloc_trace+0x24/0x30\n [ 19.311580] pci_alloc_bus+0x24/0xa0\n [ 19.311590] pci_register_host_bridge+0x48/0x4b8\n [ 19.311601] pci_scan_root_bus_bridge+0xc0/0xe8\n [ 19.311613] pci_host_probe+0x18/0xc0\n [ 19.311623] dw_pcie_host_init+0x2c0/0x568\n [ 19.311630] tegra_pcie_dw_probe+0x610/0xb28 [pcie_tegra194]\n [ 19.311647] platform_probe+0x90/0xd8\n ...\n\n [ 19.311782] freed by task 96 on cpu 10 at 19.285833s:\n [ 19.311799] release_pcibus_dev+0x30/0x40\n [ 19.311808] device_release+0x30/0x90\n [ 19.311814] kobject_put+0xa8/0x120\n [ 19.311832] device_unregister+0x20/0x30\n [ 19.311839] pci_remove_bus+0x78/0x88\n [ 19.311850] pci_remove_root_bus+0x5c/0x98\n [ 19.311860] dw_pcie_host_deinit+0x28/0x78\n [ 19.311866] tegra_pcie_deinit_controller+0x1c/0x38 [pcie_tegra194]\n [ 19.311883] tegra_pcie_dw_probe+0x648/0xb28 [pcie_tegra194]\n [ 19.311900] platform_probe+0x90/0xd8\n ...\n\n [ 19.313579] CPU: 10 PID: 96 Comm: kworker/u24:2 Not tainted 6.2.0 #4\n [ 19.320171] Hardware name: /, BIOS 1.0-d7fb19b 08/10/2022\n [ 19.325852] Workqueue: events_unbound deferred_probe_work_func\n\nThe stack trace is a bit misleading as dw_pcie_host_deinit() doesn't\ndirectly call pci_bus_release_domain_nr(). The issue turns out to be in\npci_remove_root_bus() which first calls pci_remove_bus() which frees the\nstruct pci_bus when its struct device is released. Then\npci_bus_release_domain_nr() is called and accesses the freed struct\npci_bus. Reordering these fixes the issue.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -36,8 +41,10 @@
3641
}
3742
],
3843
"database_specific": {
39-
"cwe_ids": [],
40-
"severity": null,
44+
"cwe_ids": [
45+
"CWE-416"
46+
],
47+
"severity": "HIGH",
4148
"github_reviewed": false,
4249
"github_reviewed_at": null,
4350
"nvd_published_at": "2025-09-17T15:15:40Z"

0 commit comments

Comments
 (0)