Skip to content

Commit e4be2c1

Browse files
1 parent 8709385 commit e4be2c1

File tree

3 files changed

+17
-6
lines changed

3 files changed

+17
-6
lines changed

advisories/github-reviewed/2023/11/GHSA-4vvc-r4p4-qgrr/GHSA-4vvc-r4p4-qgrr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4vvc-r4p4-qgrr",
4-
"modified": "2025-02-13T19:21:06Z",
4+
"modified": "2025-12-01T16:05:30Z",
55
"published": "2023-11-24T09:30:28Z",
66
"aliases": [
77
"CVE-2023-48796"
@@ -74,6 +74,10 @@
7474
{
7575
"type": "WEB",
7676
"url": "http://www.openwall.com/lists/oss-security/2023/11/24/1"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "http://www.openwall.com/lists/oss-security/2025/11/28/1"
7781
}
7882
],
7983
"database_specific": {

advisories/github-reviewed/2025/10/GHSA-hq76-6gh2-5g4q/GHSA-hq76-6gh2-5g4q.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hq76-6gh2-5g4q",
4-
"modified": "2025-10-27T22:31:49Z",
4+
"modified": "2025-12-01T16:06:06Z",
55
"published": "2025-10-27T16:20:25Z",
66
"aliases": [
77
"CVE-2025-58356"
@@ -55,6 +55,10 @@
5555
"type": "WEB",
5656
"url": "https://github.com/edgelesssys/constellation/commit/bb8d2c8a5c0a0a6510d2cc43055be21f4a3ab83c"
5757
},
58+
{
59+
"type": "WEB",
60+
"url": "https://blog.trailofbits.com/2025/10/30/vulnerabilities-in-luks2-disk-encryption-for-confidential-vms"
61+
},
5862
{
5963
"type": "PACKAGE",
6064
"url": "https://github.com/edgelesssys/constellation"

advisories/github-reviewed/2025/11/GHSA-2fjw-whxm-9v4q/GHSA-2fjw-whxm-9v4q.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2fjw-whxm-9v4q",
4-
"modified": "2025-11-25T23:18:37Z",
4+
"modified": "2025-12-01T16:04:47Z",
55
"published": "2025-11-25T23:18:37Z",
66
"aliases": [],
77
"summary": "libnftnl has Heap-based Buffer Overflow in nftnl::Batch::with_page_size (nftnl-rs)",
8-
"details": "A heap-buffer-overflow vulnerability exists in the Rust wrapper for libnftnl, triggered via the nftnl::Batch::with_page_size constructor. When a small or malformed page size is provided, the underlying C code allocates an insufficient buffer, leading to out-of-bounds writes during batch initialization.\n\nThe flaw was fixed in commit 94a286f by adding an overflow check:\n```Rust\nbatch_page_size\n .checked_add(crate::nft_nlmsg_maxsize())\n .expect(\"batch_page_size is too large and would overflow\");\n```\nThe fix has not been added to the Rust registry at the time of publish.",
8+
"details": "A heap-buffer-overflow vulnerability exists in the Rust wrapper for libnftnl, triggered via the nftnl::Batch::with_page_size constructor. When a small or malformed page size is provided, the underlying C code allocates an insufficient buffer, leading to out-of-bounds writes during batch initialization.\n\nThe flaw was fixed in commit 94a286f by adding an overflow check:\n```Rust\nbatch_page_size\n .checked_add(crate::nft_nlmsg_maxsize())\n .expect(\"batch_page_size is too large and would overflow\");\n```",
99
"severity": [
1010
{
1111
"type": "CVSS_V4",
@@ -26,11 +26,14 @@
2626
"introduced": "0"
2727
},
2828
{
29-
"last_affected": "0.8.0"
29+
"fixed": "0.9.0"
3030
}
3131
]
3232
}
33-
]
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 0.8.0"
36+
}
3437
}
3538
],
3639
"references": [

0 commit comments

Comments
 (0)