Skip to content

Commit 4278f1a

Browse files
Advisory Database Sync
1 parent 943711e commit 4278f1a

File tree

37 files changed

+1121
-31
lines changed

37 files changed

+1121
-31
lines changed

advisories/unreviewed/2024/03/GHSA-qrv4-68mg-fv43/GHSA-qrv4-68mg-fv43.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qrv4-68mg-fv43",
4-
"modified": "2024-03-26T00:32:02Z",
4+
"modified": "2025-12-16T00:30:27Z",
55
"published": "2024-03-26T00:32:02Z",
66
"aliases": [
77
"CVE-2024-0901"
88
],
9-
"details": "Remotely executed SEGV and out of bounds read allows malicious packet sender to crash or cause an out of bounds read via sending a malformed packet with the correct length.\n",
9+
"details": "Remotely executed SEGV and out of bounds read allows malicious packet sender to crash or cause an out of bounds read via sending a malformed packet with the correct length.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2024/06/GHSA-8fcc-fcfx-x9gq/GHSA-8fcc-fcfx-x9gq.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,9 @@
4545
}
4646
],
4747
"database_specific": {
48-
"cwe_ids": [],
48+
"cwe_ids": [
49+
"CWE-89"
50+
],
4951
"severity": "CRITICAL",
5052
"github_reviewed": false,
5153
"github_reviewed_at": null,

advisories/unreviewed/2025/08/GHSA-3v8v-6j5m-3mhg/GHSA-3v8v-6j5m-3mhg.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3v8v-6j5m-3mhg",
4-
"modified": "2025-08-22T18:31:22Z",
4+
"modified": "2025-12-16T00:30:27Z",
55
"published": "2025-08-22T18:31:22Z",
66
"aliases": [
77
"CVE-2025-38647"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: sar: drop lockdep assertion in rtw89_set_sar_from_acpi\n\nThe following assertion is triggered on the rtw89 driver startup. It\nlooks meaningless to hold wiphy lock on the early init stage so drop the\nassertion.\n\n WARNING: CPU: 7 PID: 629 at drivers/net/wireless/realtek/rtw89/sar.c:502 rtw89_set_sar_from_acpi+0x365/0x4d0 [rtw89_core]\n CPU: 7 UID: 0 PID: 629 Comm: (udev-worker) Not tainted 6.15.0+ #29 PREEMPT(lazy)\n Hardware name: LENOVO 21D0/LNVNB161216, BIOS J6CN50WW 09/27/2024\n RIP: 0010:rtw89_set_sar_from_acpi+0x365/0x4d0 [rtw89_core]\n Call Trace:\n <TASK>\n rtw89_sar_init+0x68/0x2c0 [rtw89_core]\n rtw89_core_init+0x188e/0x1e50 [rtw89_core]\n rtw89_pci_probe+0x530/0xb50 [rtw89_pci]\n local_pci_probe+0xd9/0x190\n pci_call_probe+0x183/0x540\n pci_device_probe+0x171/0x2c0\n really_probe+0x1e1/0x890\n __driver_probe_device+0x18c/0x390\n driver_probe_device+0x4a/0x120\n __driver_attach+0x1a0/0x530\n bus_for_each_dev+0x10b/0x190\n bus_add_driver+0x2eb/0x540\n driver_register+0x1a3/0x3a0\n do_one_initcall+0xd5/0x450\n do_init_module+0x2cc/0x8f0\n init_module_from_file+0xe1/0x150\n idempotent_init_module+0x226/0x760\n __x64_sys_finit_module+0xcd/0x150\n do_syscall_64+0x94/0x380\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFound by Linux Verification Center (linuxtesting.org).",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -25,7 +30,7 @@
2530
],
2631
"database_specific": {
2732
"cwe_ids": [],
28-
"severity": null,
33+
"severity": "MODERATE",
2934
"github_reviewed": false,
3035
"github_reviewed_at": null,
3136
"nvd_published_at": "2025-08-22T16:15:39Z"

advisories/unreviewed/2025/12/GHSA-285f-828q-q7g5/GHSA-285f-828q-q7g5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-285f-828q-q7g5",
4-
"modified": "2025-12-05T15:30:26Z",
4+
"modified": "2025-12-16T00:30:28Z",
55
"published": "2025-12-05T15:30:26Z",
66
"aliases": [
77
"CVE-2025-6966"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://bugs.launchpad.net/ubuntu/+source/python-apt/+bug/2091865"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00019.html"
2529
}
2630
],
2731
"database_specific": {
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3g96-v8h5-2g5f",
4+
"modified": "2025-12-16T00:30:30Z",
5+
"published": "2025-12-16T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-10898"
8+
],
9+
"details": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10898"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.autodesk.com/products/autodesk-access/overview"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-787"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-16T00:16:01Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-43hh-3vfr-vvfx",
4+
"modified": "2025-12-16T00:30:30Z",
5+
"published": "2025-12-16T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-9459"
8+
],
9+
"details": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9459"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.autodesk.com/products/autodesk-access/overview"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-125"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-16T00:16:03Z"
39+
}
40+
}

advisories/unreviewed/2025/12/GHSA-4f42-626f-cqm7/GHSA-4f42-626f-cqm7.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4f42-626f-cqm7",
4-
"modified": "2025-12-12T21:31:38Z",
4+
"modified": "2025-12-16T00:30:28Z",
55
"published": "2025-12-12T21:31:38Z",
66
"aliases": [
77
"CVE-2025-43406"
88
],
99
"details": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Tahoe 26.1. An app may be able to access sensitive user data.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -21,7 +26,7 @@
2126
],
2227
"database_specific": {
2328
"cwe_ids": [],
24-
"severity": null,
29+
"severity": "MODERATE",
2530
"github_reviewed": false,
2631
"github_reviewed_at": null,
2732
"nvd_published_at": "2025-12-12T21:15:54Z"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4hm2-jff2-cw82",
4+
"modified": "2025-12-16T00:30:30Z",
5+
"published": "2025-12-16T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-10884"
8+
],
9+
"details": "AA maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10884"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.autodesk.com/products/autodesk-access/overview"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-787"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-16T00:16:00Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4hp4-5c2h-v77h",
4+
"modified": "2025-12-16T00:30:30Z",
5+
"published": "2025-12-16T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-9457"
8+
],
9+
"details": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9457"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.autodesk.com/products/autodesk-access/overview"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-120"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-16T00:16:03Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6f7c-9hm7-xgw3",
4+
"modified": "2025-12-16T00:30:30Z",
5+
"published": "2025-12-16T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-9453"
8+
],
9+
"details": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9453"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.autodesk.com/products/autodesk-access/overview"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-125"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-16T00:16:03Z"
39+
}
40+
}

0 commit comments

Comments
 (0)