Skip to content

Commit bbdeb3c

Browse files
Advisory Database Sync
1 parent d9e5b1e commit bbdeb3c

File tree

102 files changed

+1635
-212
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

102 files changed

+1635
-212
lines changed

advisories/github-reviewed/2025/09/GHSA-m68q-4hqr-mc6f/GHSA-m68q-4hqr-mc6f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m68q-4hqr-mc6f",
4-
"modified": "2025-11-28T15:30:29Z",
4+
"modified": "2025-12-03T18:30:21Z",
55
"published": "2025-09-16T15:32:37Z",
66
"aliases": [
77
"CVE-2025-4953"
@@ -64,6 +64,10 @@
6464
"type": "WEB",
6565
"url": "https://access.redhat.com/errata/RHSA-2025:17669"
6666
},
67+
{
68+
"type": "WEB",
69+
"url": "https://access.redhat.com/errata/RHSA-2025:22265"
70+
},
6771
{
6872
"type": "WEB",
6973
"url": "https://access.redhat.com/errata/RHSA-2025:2703"

advisories/unreviewed/2022/05/GHSA-36m7-j2mr-5864/GHSA-36m7-j2mr-5864.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-36m7-j2mr-5864",
4-
"modified": "2022-05-24T17:43:02Z",
4+
"modified": "2025-12-03T18:30:19Z",
55
"published": "2022-05-24T17:43:02Z",
66
"aliases": [
77
"CVE-2020-36254"
88
],
99
"details": "scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-gw8r-xfqw-vw42/GHSA-gw8r-xfqw-vw42.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gw8r-xfqw-vw42",
4-
"modified": "2023-05-05T18:30:14Z",
4+
"modified": "2025-12-03T18:30:19Z",
55
"published": "2022-05-24T17:08:01Z",
66
"aliases": [
77
"CVE-2020-8597"
@@ -63,6 +63,14 @@
6363
"type": "WEB",
6464
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR"
6565
},
66+
{
67+
"type": "WEB",
68+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR"
73+
},
6674
{
6775
"type": "WEB",
6876
"url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html"

advisories/unreviewed/2025/08/GHSA-5j7v-6mfx-vg6c/GHSA-5j7v-6mfx-vg6c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5j7v-6mfx-vg6c",
4-
"modified": "2025-08-19T21:30:36Z",
4+
"modified": "2025-12-03T18:30:19Z",
55
"published": "2025-08-19T21:30:36Z",
66
"aliases": [
77
"CVE-2024-44373"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44373"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://gh0stmezh.wordpress.com/2024/08/25/cve-2024-44373"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://github.com/AllskyTeam/allsky"

advisories/unreviewed/2025/09/GHSA-22jx-v9jm-qjqq/GHSA-22jx-v9jm-qjqq.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-22jx-v9jm-qjqq",
4-
"modified": "2025-09-15T15:31:25Z",
4+
"modified": "2025-12-03T18:30:19Z",
55
"published": "2025-09-15T15:31:25Z",
66
"aliases": [
77
"CVE-2022-50269"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vkms: Fix memory leak in vkms_init()\n\nA memory leak was reported after the vkms module install failed.\n\nunreferenced object 0xffff88810bc28520 (size 16):\n comm \"modprobe\", pid 9662, jiffies 4298009455 (age 42.590s)\n hex dump (first 16 bytes):\n 01 01 00 64 81 88 ff ff 00 00 dc 0a 81 88 ff ff ...d............\n backtrace:\n [<00000000e7561ff8>] kmalloc_trace+0x27/0x60\n [<000000000b1954a0>] 0xffffffffc45200a9\n [<00000000abbf1da0>] do_one_initcall+0xd0/0x4f0\n [<000000001505ee87>] do_init_module+0x1a4/0x680\n [<00000000958079ad>] load_module+0x6249/0x7110\n [<00000000117e4696>] __do_sys_finit_module+0x140/0x200\n [<00000000f74b12d2>] do_syscall_64+0x35/0x80\n [<000000008fc6fcde>] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe reason is that the vkms_init() returns without checking the return\nvalue of vkms_create(), and if the vkms_create() failed, the config\nallocated at the beginning of vkms_init() is leaked.\n\n vkms_init()\n config = kmalloc(...) # config allocated\n ...\n return vkms_create() # vkms_create failed and config is leaked\n\nFix this problem by checking return value of vkms_create() and free the\nconfig if error happened.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -32,8 +37,10 @@
3237
}
3338
],
3439
"database_specific": {
35-
"cwe_ids": [],
36-
"severity": null,
40+
"cwe_ids": [
41+
"CWE-401"
42+
],
43+
"severity": "MODERATE",
3744
"github_reviewed": false,
3845
"github_reviewed_at": null,
3946
"nvd_published_at": "2025-09-15T15:15:37Z"

advisories/unreviewed/2025/09/GHSA-23pr-hf4g-r8h2/GHSA-23pr-hf4g-r8h2.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-23pr-hf4g-r8h2",
4-
"modified": "2025-09-16T15:32:33Z",
4+
"modified": "2025-12-03T18:30:20Z",
55
"published": "2025-09-16T15:32:33Z",
66
"aliases": [
77
"CVE-2023-53274"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: mt8183: Add back SSPM related clocks\n\nThis reverts commit 860690a93ef23b567f781c1b631623e27190f101.\n\nOn the MT8183, the SSPM related clocks were removed claiming a lack of\nusage. This however causes some issues when the driver was converted to\nthe new simple-probe mechanism. This mechanism allocates enough space\nfor all the clocks defined in the clock driver, not the highest index\nin the DT binding. This leads to out-of-bound writes if their are holes\nin the DT binding or the driver (due to deprecated or unimplemented\nclocks). These errors can go unnoticed and cause memory corruption,\nleading to crashes in unrelated areas, or nothing at all. KASAN will\ndetect them.\n\nAdd the SSPM related clocks back to the MT8183 clock driver to fully\nimplement the DT binding. The SSPM clocks are for the power management\nco-processor, and should never be turned off. They are marked as such.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-787"
34+
],
35+
"severity": "HIGH",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2025-09-16T08:15:36Z"

advisories/unreviewed/2025/09/GHSA-2px4-3jpx-h38h/GHSA-2px4-3jpx-h38h.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2px4-3jpx-h38h",
4-
"modified": "2025-09-15T15:31:30Z",
4+
"modified": "2025-12-03T18:30:20Z",
55
"published": "2025-09-15T15:31:30Z",
66
"aliases": [
77
"CVE-2023-53253"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: nvidia-shield: Reference hid_device devm allocation of input_dev name\n\nUse hid_device for devm allocation of the input_dev name to avoid a\nuse-after-free. input_unregister_device would trigger devres cleanup of all\nresources associated with the input_dev, free-ing the name. The name would\nsubsequently be used in a uevent fired at the end of unregistering the\ninput_dev.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-416"
34+
],
35+
"severity": "HIGH",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2025-09-15T15:15:52Z"

advisories/unreviewed/2025/09/GHSA-542m-h257-c5wg/GHSA-542m-h257-c5wg.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-542m-h257-c5wg",
4-
"modified": "2025-09-15T15:31:25Z",
4+
"modified": "2025-12-03T18:30:19Z",
55
"published": "2025-09-15T15:31:25Z",
66
"aliases": [
77
"CVE-2022-50267"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: rtsx_pci: fix return value check of mmc_add_host()\n\nmmc_add_host() may return error, if we ignore its return value, the memory\nthat allocated in mmc_alloc_host() will be leaked and it will lead a kernel\ncrash because of deleting not added device in the remove path.\n\nSo fix this by checking the return value and calling mmc_free_host() in the\nerror path, beside, runtime PM also needs be disabled.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -32,8 +37,10 @@
3237
}
3338
],
3439
"database_specific": {
35-
"cwe_ids": [],
36-
"severity": null,
40+
"cwe_ids": [
41+
"CWE-476"
42+
],
43+
"severity": "MODERATE",
3744
"github_reviewed": false,
3845
"github_reviewed_at": null,
3946
"nvd_published_at": "2025-09-15T15:15:37Z"

advisories/unreviewed/2025/09/GHSA-5c8m-gj2j-m6jw/GHSA-5c8m-gj2j-m6jw.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5c8m-gj2j-m6jw",
4-
"modified": "2025-09-16T15:32:33Z",
4+
"modified": "2025-12-03T18:30:20Z",
55
"published": "2025-09-16T15:32:33Z",
66
"aliases": [
77
"CVE-2023-53288"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fix memory leak in drm_client_modeset_probe\n\nWhen a new mode is set to modeset->mode, the previous mode should be freed.\nThis fixes the following kmemleak report:\n\ndrm_mode_duplicate+0x45/0x220 [drm]\ndrm_client_modeset_probe+0x944/0xf50 [drm]\n__drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]\ndrm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]\ndrm_client_register+0x169/0x240 [drm]\nast_pci_probe+0x142/0x190 [ast]\nlocal_pci_probe+0xdc/0x180\nwork_for_cpu_fn+0x4e/0xa0\nprocess_one_work+0x8b7/0x1540\nworker_thread+0x70a/0xed0\nkthread+0x29f/0x340\nret_from_fork+0x1f/0x30",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -40,8 +45,10 @@
4045
}
4146
],
4247
"database_specific": {
43-
"cwe_ids": [],
44-
"severity": null,
48+
"cwe_ids": [
49+
"CWE-401"
50+
],
51+
"severity": "MODERATE",
4552
"github_reviewed": false,
4653
"github_reviewed_at": null,
4754
"nvd_published_at": "2025-09-16T08:15:37Z"

advisories/unreviewed/2025/09/GHSA-5qfv-wj98-fqxv/GHSA-5qfv-wj98-fqxv.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5qfv-wj98-fqxv",
4-
"modified": "2025-09-15T15:31:30Z",
4+
"modified": "2025-12-03T18:30:20Z",
55
"published": "2025-09-15T15:31:30Z",
66
"aliases": [
77
"CVE-2023-53257"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check S1G action frame size\n\nBefore checking the action code, check that it even\nexists in the frame.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -33,7 +38,7 @@
3338
],
3439
"database_specific": {
3540
"cwe_ids": [],
36-
"severity": null,
41+
"severity": "HIGH",
3742
"github_reviewed": false,
3843
"github_reviewed_at": null,
3944
"nvd_published_at": "2025-09-15T15:15:53Z"

0 commit comments

Comments
 (0)