Skip to content

Commit 89a981d

Browse files
Advisory Database Sync
1 parent c0f34a8 commit 89a981d

File tree

29 files changed

+493
-27
lines changed

29 files changed

+493
-27
lines changed

advisories/unreviewed/2025/09/GHSA-ggg7-h54g-wmq5/GHSA-ggg7-h54g-wmq5.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ggg7-h54g-wmq5",
4-
"modified": "2025-09-17T15:30:38Z",
4+
"modified": "2025-12-10T15:31:21Z",
55
"published": "2025-09-17T15:30:38Z",
66
"aliases": [
77
"CVE-2023-53345"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix potential data race in rxrpc_wait_to_be_connected()\n\nInside the loop in rxrpc_wait_to_be_connected() it checks call->error to\nsee if it should exit the loop without first checking the call state. This\nis probably safe as if call->error is set, the call is dead anyway, but we\nshould probably wait for the call state to have been set to completion\nfirst, lest it cause surprise on the way out.\n\nFix this by only accessing call->error if the call is complete. We don't\nactually need to access the error inside the loop as we'll do that after.\n\nThis caused the following report:\n\n BUG: KCSAN: data-race in rxrpc_send_data / rxrpc_set_call_completion\n\n write to 0xffff888159cf3c50 of 4 bytes by task 25673 on cpu 1:\n rxrpc_set_call_completion+0x71/0x1c0 net/rxrpc/call_state.c:22\n rxrpc_send_data_packet+0xba9/0x1650 net/rxrpc/output.c:479\n rxrpc_transmit_one+0x1e/0x130 net/rxrpc/output.c:714\n rxrpc_decant_prepared_tx net/rxrpc/call_event.c:326 [inline]\n rxrpc_transmit_some_data+0x496/0x600 net/rxrpc/call_event.c:350\n rxrpc_input_call_event+0x564/0x1220 net/rxrpc/call_event.c:464\n rxrpc_io_thread+0x307/0x1d80 net/rxrpc/io_thread.c:461\n kthread+0x1ac/0x1e0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308\n\n read to 0xffff888159cf3c50 of 4 bytes by task 25672 on cpu 0:\n rxrpc_send_data+0x29e/0x1950 net/rxrpc/sendmsg.c:296\n rxrpc_do_sendmsg+0xb7a/0xc20 net/rxrpc/sendmsg.c:726\n rxrpc_sendmsg+0x413/0x520 net/rxrpc/af_rxrpc.c:565\n sock_sendmsg_nosec net/socket.c:724 [inline]\n sock_sendmsg net/socket.c:747 [inline]\n ____sys_sendmsg+0x375/0x4c0 net/socket.c:2501\n ___sys_sendmsg net/socket.c:2555 [inline]\n __sys_sendmmsg+0x263/0x500 net/socket.c:2641\n __do_sys_sendmmsg net/socket.c:2670 [inline]\n __se_sys_sendmmsg net/socket.c:2667 [inline]\n __x64_sys_sendmmsg+0x57/0x60 net/socket.c:2667\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n value changed: 0x00000000 -> 0xffffffea",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -28,8 +33,10 @@
2833
}
2934
],
3035
"database_specific": {
31-
"cwe_ids": [],
32-
"severity": null,
36+
"cwe_ids": [
37+
"CWE-362"
38+
],
39+
"severity": "MODERATE",
3340
"github_reviewed": false,
3441
"github_reviewed_at": null,
3542
"nvd_published_at": "2025-09-17T15:15:38Z"

advisories/unreviewed/2025/12/GHSA-24pp-jv4q-cp8j/GHSA-24pp-jv4q-cp8j.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-24pp-jv4q-cp8j",
4-
"modified": "2025-12-09T18:30:35Z",
4+
"modified": "2025-12-10T15:31:22Z",
55
"published": "2025-12-09T18:30:35Z",
66
"aliases": [
77
"CVE-2025-14323"
@@ -34,6 +34,14 @@
3434
{
3535
"type": "WEB",
3636
"url": "https://www.mozilla.org/security/advisories/mfsa2025-94"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-95"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-96"
3745
}
3846
],
3947
"database_specific": {

advisories/unreviewed/2025/12/GHSA-2628-4jvp-96vc/GHSA-2628-4jvp-96vc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2628-4jvp-96vc",
4-
"modified": "2025-12-09T18:30:35Z",
4+
"modified": "2025-12-10T15:31:22Z",
55
"published": "2025-12-09T18:30:35Z",
66
"aliases": [
77
"CVE-2025-14326"
@@ -21,6 +21,10 @@
2121
{
2222
"type": "WEB",
2323
"url": "https://www.mozilla.org/security/advisories/mfsa2025-92"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-95"
2428
}
2529
],
2630
"database_specific": {
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2fw6-rcj8-hfw7",
4+
"modified": "2025-12-10T15:31:24Z",
5+
"published": "2025-12-10T15:31:24Z",
6+
"aliases": [
7+
"CVE-2025-13152"
8+
],
9+
"details": "A potential DLL hijacking vulnerability was reported in Lenovo One Client during an internal security assessment that could allow a local authenticated user to execute code with elevated privileges.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13152"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://iknow.lenovo.com.cn/detail/435007"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://one.lenovo.com"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-427"
38+
],
39+
"severity": "HIGH",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-12-10T15:15:56Z"
43+
}
44+
}

advisories/unreviewed/2025/12/GHSA-2ghp-fh92-8w9r/GHSA-2ghp-fh92-8w9r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2ghp-fh92-8w9r",
4-
"modified": "2025-12-09T18:30:35Z",
4+
"modified": "2025-12-10T15:31:23Z",
55
"published": "2025-12-09T18:30:35Z",
66
"aliases": [
77
"CVE-2025-14332"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://www.mozilla.org/security/advisories/mfsa2025-92"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-95"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/12/GHSA-364v-7wgj-4r69/GHSA-364v-7wgj-4r69.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-364v-7wgj-4r69",
4-
"modified": "2025-12-09T18:30:35Z",
4+
"modified": "2025-12-10T15:31:22Z",
55
"published": "2025-12-09T18:30:35Z",
66
"aliases": [
77
"CVE-2025-14325"
@@ -30,6 +30,14 @@
3030
{
3131
"type": "WEB",
3232
"url": "https://www.mozilla.org/security/advisories/mfsa2025-94"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-95"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-96"
3341
}
3442
],
3543
"database_specific": {
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4759-wrpr-635r",
4+
"modified": "2025-12-10T15:31:24Z",
5+
"published": "2025-12-10T15:31:23Z",
6+
"aliases": [
7+
"CVE-2025-13127"
8+
],
9+
"details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TAC Information Services Internal and External Trade Inc. GoldenHorn allows Cross-Site Scripting (XSS).This issue affects GoldenHorn: before 4.25.1121.1.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13127"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.usom.gov.tr/bildirim/tr-25-0441"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-10T14:16:19Z"
35+
}
36+
}

advisories/unreviewed/2025/12/GHSA-4mm6-6c2q-x3fp/GHSA-4mm6-6c2q-x3fp.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4mm6-6c2q-x3fp",
4-
"modified": "2025-12-09T18:30:35Z",
4+
"modified": "2025-12-10T15:31:23Z",
55
"published": "2025-12-09T18:30:35Z",
66
"aliases": [
77
"CVE-2025-14333"
@@ -30,6 +30,14 @@
3030
{
3131
"type": "WEB",
3232
"url": "https://www.mozilla.org/security/advisories/mfsa2025-94"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-95"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.mozilla.org/security/advisories/mfsa2025-96"
3341
}
3442
],
3543
"database_specific": {

advisories/unreviewed/2025/12/GHSA-54r2-66hp-mpw9/GHSA-54r2-66hp-mpw9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-54r2-66hp-mpw9",
4-
"modified": "2025-12-05T18:31:12Z",
4+
"modified": "2025-12-10T15:31:22Z",
55
"published": "2025-12-05T18:31:12Z",
66
"aliases": [
77
"CVE-2020-36880"
88
],
99
"details": "Flexsense DiskBoss 7.7.14 contains a local buffer overflow vulnerability in the 'Reports and Data Directory' field that allows an attacker to execute arbitrary code on the system.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6238-89rc-fwrc",
4+
"modified": "2025-12-10T15:31:24Z",
5+
"published": "2025-12-10T15:31:23Z",
6+
"aliases": [
7+
"CVE-2024-2105"
8+
],
9+
"details": "An unauthorised attacker within bluetooth range may use an improper validation during the BLE connection request to deadlock the affected devices.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2105"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://certvde.com/en/advisories/VDE-2025-089"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://harman.csaf-tp.certvde.com/.well-known/csaf/white/2025/hbsa-2025-0002.json"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-1287"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-10T13:16:02Z"
39+
}
40+
}

0 commit comments

Comments
 (0)