|
379 | 379 | "title": "CVE-2022-45939 - emacs, emacs-common and 1 more",
|
380 | 380 | "reason_to_ignore": "N/A"
|
381 | 381 | }
|
| 382 | + ], |
| 383 | + "linux-libc-dev": [ |
| 384 | + { |
| 385 | + "description": "In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their CPU masks and unconditionally accesses per-CPU data for the first CPU of each mask. According to Documentation/admin-guide/mm/numaperf.rst: \"Some memory may share the same node as a CPU, and others are provided as memory only nodes.\" Therefore, some node CPU masks may be empty and wouldn't have a \"first CPU\". On a machine with far memory (and therefore CPU-less NUMA nodes): - cpumask_of_node(nid) is 0 - cpumask_first(0) is CONFIG_NR_CPUS - cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an index that is 1 out of bounds This does not have any security implications since flashing microcode is a privileged operation but I believe this has reliability implications by potentially corrupting memory while flashing a microcode update. When booting with CONFIG_UBSAN_BOUNDS=y on an AMD ma", |
| 386 | + "vulnerability_id": "CVE-2025-21991", |
| 387 | + "name": "CVE-2025-21991", |
| 388 | + "package_name": "linux-libc-dev", |
| 389 | + "package_details": { |
| 390 | + "file_path": null, |
| 391 | + "name": "linux-libc-dev", |
| 392 | + "package_manager": "OS", |
| 393 | + "version": "5.4.0", |
| 394 | + "release": "216.236" |
| 395 | + }, |
| 396 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 397 | + "cvss_v3_score": 7.8, |
| 398 | + "cvss_v30_score": 0.0, |
| 399 | + "cvss_v31_score": 7.8, |
| 400 | + "cvss_v2_score": 0.0, |
| 401 | + "cvss_v3_severity": "HIGH", |
| 402 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-21991.html", |
| 403 | + "source": "UBUNTU_CVE", |
| 404 | + "severity": "HIGH", |
| 405 | + "status": "ACTIVE", |
| 406 | + "title": "CVE-2025-21991 - linux-libc-dev", |
| 407 | + "reason_to_ignore": "N/A" |
| 408 | + }, |
| 409 | + { |
| 410 | + "description": "In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() When performing an iSCSI boot using IPv6, iscsistart still reads the /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix length is 64, this causes the shift exponent to become negative, triggering a UBSAN warning. As the concept of a subnet mask does not apply to IPv6, the value is set to ~0 to suppress the warning message.", |
| 411 | + "vulnerability_id": "CVE-2025-21993", |
| 412 | + "name": "CVE-2025-21993", |
| 413 | + "package_name": "linux-libc-dev", |
| 414 | + "package_details": { |
| 415 | + "file_path": null, |
| 416 | + "name": "linux-libc-dev", |
| 417 | + "package_manager": "OS", |
| 418 | + "version": "5.4.0", |
| 419 | + "release": "216.236" |
| 420 | + }, |
| 421 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 422 | + "cvss_v3_score": 7.1, |
| 423 | + "cvss_v30_score": 0.0, |
| 424 | + "cvss_v31_score": 7.1, |
| 425 | + "cvss_v2_score": 0.0, |
| 426 | + "cvss_v3_severity": "HIGH", |
| 427 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-21993.html", |
| 428 | + "source": "UBUNTU_CVE", |
| 429 | + "severity": "HIGH", |
| 430 | + "status": "ACTIVE", |
| 431 | + "title": "CVE-2025-21993 - linux-libc-dev", |
| 432 | + "reason_to_ignore": "N/A" |
| 433 | + }, |
| 434 | + { |
| 435 | + "description": "In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 Read of size 1 at addr ffff888111f322cd by task swapper/0/0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc4-dirty #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 Call Trace: <IRQ> dump_stack_lvl+0x68/0xa0 print_address_description.constprop.0+0x2c/0x3d0 print_report+0xb4/0x270 kasan_report+0xbd/0xf0 tcp_write_timer_handler+0x156/0x3e0 tcp_write_timer+0x66/0x170 call_timer_fn+0xfb/0x1d0 __run_timers+0x3f8/0x480 run_timer_softirq+0x9b/0x100 handle_softirqs+0x153/0x390 __irq_exit_rcu+0x103/0x120 irq_exit_rcu+0xe/0x20 sysvec_apic_timer_interrupt+0x76/0x90 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:default_idle+0xf/0x20 Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 33 f8 25 00 fb f4 <fa> c3 cc", |
| 436 | + "vulnerability_id": "CVE-2024-53168", |
| 437 | + "name": "CVE-2024-53168", |
| 438 | + "package_name": "linux-libc-dev", |
| 439 | + "package_details": { |
| 440 | + "file_path": null, |
| 441 | + "name": "linux-libc-dev", |
| 442 | + "package_manager": "OS", |
| 443 | + "version": "5.4.0", |
| 444 | + "release": "216.236" |
| 445 | + }, |
| 446 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 447 | + "cvss_v3_score": 7.8, |
| 448 | + "cvss_v30_score": 0.0, |
| 449 | + "cvss_v31_score": 7.8, |
| 450 | + "cvss_v2_score": 0.0, |
| 451 | + "cvss_v3_severity": "HIGH", |
| 452 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-53168.html", |
| 453 | + "source": "UBUNTU_CVE", |
| 454 | + "severity": "HIGH", |
| 455 | + "status": "ACTIVE", |
| 456 | + "title": "CVE-2024-53168 - linux-libc-dev", |
| 457 | + "reason_to_ignore": "N/A" |
| 458 | + }, |
| 459 | + { |
| 460 | + "description": "In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.000016] Call Trace: [ +0.000008] <TASK> [ +0.000009] dump_stack_lvl+0x76/0xa0 [ +0.000017] print_report+0xce/0x5f0 [ +0.000017] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] ? srso_return_thunk+0x5/0x5f [ +0.000015] ? kasan_complete_mode_report_info+0x72/0x200 [ +0.000016] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] kasan_report+0xbe/0x110 [ +0.000015] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000023] __asan_report_load8_noabort+0x14/0x30 [ +0.000014] drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.00", |
| 461 | + "vulnerability_id": "CVE-2024-56551", |
| 462 | + "name": "CVE-2024-56551", |
| 463 | + "package_name": "linux-libc-dev", |
| 464 | + "package_details": { |
| 465 | + "file_path": null, |
| 466 | + "name": "linux-libc-dev", |
| 467 | + "package_manager": "OS", |
| 468 | + "version": "5.4.0", |
| 469 | + "release": "216.236" |
| 470 | + }, |
| 471 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 472 | + "cvss_v3_score": 7.8, |
| 473 | + "cvss_v30_score": 0.0, |
| 474 | + "cvss_v31_score": 7.8, |
| 475 | + "cvss_v2_score": 0.0, |
| 476 | + "cvss_v3_severity": "HIGH", |
| 477 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-56551.html", |
| 478 | + "source": "UBUNTU_CVE", |
| 479 | + "severity": "HIGH", |
| 480 | + "status": "ACTIVE", |
| 481 | + "title": "CVE-2024-56551 - linux-libc-dev", |
| 482 | + "reason_to_ignore": "N/A" |
| 483 | + }, |
| 484 | + { |
| 485 | + "description": "In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.", |
| 486 | + "vulnerability_id": "CVE-2025-22004", |
| 487 | + "name": "CVE-2025-22004", |
| 488 | + "package_name": "linux-libc-dev", |
| 489 | + "package_details": { |
| 490 | + "file_path": null, |
| 491 | + "name": "linux-libc-dev", |
| 492 | + "package_manager": "OS", |
| 493 | + "version": "5.4.0", |
| 494 | + "release": "216.236" |
| 495 | + }, |
| 496 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 497 | + "cvss_v3_score": 7.8, |
| 498 | + "cvss_v30_score": 0.0, |
| 499 | + "cvss_v31_score": 7.8, |
| 500 | + "cvss_v2_score": 0.0, |
| 501 | + "cvss_v3_severity": "HIGH", |
| 502 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22004.html", |
| 503 | + "source": "UBUNTU_CVE", |
| 504 | + "severity": "HIGH", |
| 505 | + "status": "ACTIVE", |
| 506 | + "title": "CVE-2025-22004 - linux-libc-dev", |
| 507 | + "reason_to_ignore": "N/A" |
| 508 | + }, |
| 509 | + { |
| 510 | + "description": "In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241 CPU: 6 UID: 0 PID: 140241 Comm: kworker/6:0 Kdump: loaded Tainted: G E 6.14.0-rc6+ #1 Tainted: [E]=UNSIGNED_MODULE Hardware name: LENOVO 30FNA1V7CW/1057, BIOS S0EKT54A 07/01/2024 Workqueue: events rtsx_usb_ms_poll_card [rtsx_usb_ms] Call Trace: <TASK> dump_stack_lvl+0x51/0x70 print_address_description.constprop.0+0x27/0x320 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] print_report+0x3e/0x70 kasan_report+0xab/0xe0 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] ? __pfx_rtsx_usb_ms_poll_card+0x10/0x10 [rtsx_usb_ms] ? __pfx___schedule+0x10/0x10 ? kick_pool+0x3b/0x270 process_", |
| 511 | + "vulnerability_id": "CVE-2025-22020", |
| 512 | + "name": "CVE-2025-22020", |
| 513 | + "package_name": "linux-libc-dev", |
| 514 | + "package_details": { |
| 515 | + "file_path": null, |
| 516 | + "name": "linux-libc-dev", |
| 517 | + "package_manager": "OS", |
| 518 | + "version": "5.4.0", |
| 519 | + "release": "216.236" |
| 520 | + }, |
| 521 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 522 | + "cvss_v3_score": 7.8, |
| 523 | + "cvss_v30_score": 0.0, |
| 524 | + "cvss_v31_score": 7.8, |
| 525 | + "cvss_v2_score": 0.0, |
| 526 | + "cvss_v3_severity": "HIGH", |
| 527 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22020.html", |
| 528 | + "source": "UBUNTU_CVE", |
| 529 | + "severity": "HIGH", |
| 530 | + "status": "ACTIVE", |
| 531 | + "title": "CVE-2025-22020 - linux-libc-dev", |
| 532 | + "reason_to_ignore": "N/A" |
| 533 | + }, |
| 534 | + { |
| 535 | + "description": "In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds read in ea_get() During the \"size_check\" label in ea_get(), the code checks if the extended attribute list (xattr) size matches ea_size. If not, it logs \"ea_get: invalid extended attribute\" and calls print_hex_dump(). Here, EALIST_SIZE(ea_buf->xattr) returns 4110417968, which exceeds INT_MAX (2,147,483,647). Then ea_size is clamped: int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr)); Although clamp_t aims to bound ea_size between 0 and 4110417968, the upper limit is treated as an int, causing an overflow above 2^31 - 1. This leads \"size\" to wrap around and become negative (-184549328). The \"size\" is then passed to print_hex_dump() (called \"len\" in print_hex_dump()), it is passed as type size_t (an unsigned type), this is then stored inside a variable called \"int remaining\", which is then assigned to \"int linelen\" which is then passed to hex_dump_to_buffer(). In print_hex_dump() the for loop, iterates t", |
| 536 | + "vulnerability_id": "CVE-2025-39735", |
| 537 | + "name": "CVE-2025-39735", |
| 538 | + "package_name": "linux-libc-dev", |
| 539 | + "package_details": { |
| 540 | + "file_path": null, |
| 541 | + "name": "linux-libc-dev", |
| 542 | + "package_manager": "OS", |
| 543 | + "version": "5.4.0", |
| 544 | + "release": "216.236" |
| 545 | + }, |
| 546 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 547 | + "cvss_v3_score": 7.1, |
| 548 | + "cvss_v30_score": 0.0, |
| 549 | + "cvss_v31_score": 7.1, |
| 550 | + "cvss_v2_score": 0.0, |
| 551 | + "cvss_v3_severity": "HIGH", |
| 552 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-39735.html", |
| 553 | + "source": "UBUNTU_CVE", |
| 554 | + "severity": "HIGH", |
| 555 | + "status": "ACTIVE", |
| 556 | + "title": "CVE-2025-39735 - linux-libc-dev", |
| 557 | + "reason_to_ignore": "N/A" |
| 558 | + }, |
| 559 | + { |
| 560 | + "description": "In the Linux kernel, the following vulnerability has been resolved: tracing: Fix use-after-free in print_graph_function_flags during tracer switching Kairui reported a UAF issue in print_graph_function_flags() during ftrace stress testing [1]. This issue can be reproduced if puting a 'mdelay(10)' after 'mutex_unlock(&trace_types_lock)' in s_start(), and executing the following script: $ echo function_graph > current_tracer $ cat trace > /dev/null & $ sleep 5 # Ensure the 'cat' reaches the 'mdelay(10)' point $ echo timerlat > current_tracer The root cause lies in the two calls to print_graph_function_flags within print_trace_line during each s_show(): * One through 'iter->trace->print_line()'; * Another through 'event->funcs->trace()', which is hidden in print_trace_fmt() before print_trace_line returns. Tracer switching only updates the former, while the latter continues to use the print_line function of the old tracer, which in the script above is print_graph_function_flags. Moreover, when switching from the", |
| 561 | + "vulnerability_id": "CVE-2025-22035", |
| 562 | + "name": "CVE-2025-22035", |
| 563 | + "package_name": "linux-libc-dev", |
| 564 | + "package_details": { |
| 565 | + "file_path": null, |
| 566 | + "name": "linux-libc-dev", |
| 567 | + "package_manager": "OS", |
| 568 | + "version": "5.4.0", |
| 569 | + "release": "216.236" |
| 570 | + }, |
| 571 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 572 | + "cvss_v3_score": 7.8, |
| 573 | + "cvss_v30_score": 0.0, |
| 574 | + "cvss_v31_score": 7.8, |
| 575 | + "cvss_v2_score": 0.0, |
| 576 | + "cvss_v3_severity": "HIGH", |
| 577 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22035.html", |
| 578 | + "source": "UBUNTU_CVE", |
| 579 | + "severity": "HIGH", |
| 580 | + "status": "ACTIVE", |
| 581 | + "title": "CVE-2025-22035 - linux-libc-dev", |
| 582 | + "reason_to_ignore": "N/A" |
| 583 | + }, |
| 584 | + { |
| 585 | + "description": "In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in async decryption Doing an async decryption (large read) crashes with a slab-use-after-free way down in the crypto API. Reproducer: # mount.cifs -o ...,seal,esize=1 //srv/share /mnt # dd if=/mnt/largefile of=/dev/null ... [ 194.196391] ================================================================== [ 194.196844] BUG: KASAN: slab-use-after-free in gf128mul_4k_lle+0xc1/0x110 [ 194.197269] Read of size 8 at addr ffff888112bd0448 by task kworker/u77:2/899 [ 194.197707] [ 194.197818] CPU: 12 UID: 0 PID: 899 Comm: kworker/u77:2 Not tainted 6.11.0-lku-00028-gfca3ca14a17a-dirty #43 [ 194.198400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014 [ 194.199046] Workqueue: smb3decryptd smb2_decrypt_offload [cifs] [ 194.200032] Call Trace: [ 194.200191] <TASK> [ 194.200327] dump_stack_lvl+0x4e/0x70 [ 194.200558] ? gf128mul_4k_lle+0xc1/0x110 [ 194.200809] print_report+0x17", |
| 586 | + "vulnerability_id": "CVE-2024-50047", |
| 587 | + "name": "CVE-2024-50047", |
| 588 | + "package_name": "linux-libc-dev", |
| 589 | + "package_details": { |
| 590 | + "file_path": null, |
| 591 | + "name": "linux-libc-dev", |
| 592 | + "package_manager": "OS", |
| 593 | + "version": "5.4.0", |
| 594 | + "release": "216.236" |
| 595 | + }, |
| 596 | + "remediation": { "recommendation": { "text": "None Provided" } }, |
| 597 | + "cvss_v3_score": 7.8, |
| 598 | + "cvss_v30_score": 0.0, |
| 599 | + "cvss_v31_score": 7.8, |
| 600 | + "cvss_v2_score": 0.0, |
| 601 | + "cvss_v3_severity": "HIGH", |
| 602 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-50047.html", |
| 603 | + "source": "UBUNTU_CVE", |
| 604 | + "severity": "HIGH", |
| 605 | + "status": "ACTIVE", |
| 606 | + "title": "CVE-2024-50047 - linux-libc-dev", |
| 607 | + "reason_to_ignore": "N/A" |
| 608 | + } |
382 | 609 | ]
|
383 | 610 | }
|
0 commit comments