From 333dfecf721bb07c3ed1dbf90309d03c03fc02be Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 21 Apr 2025 01:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/43xxx/CVE-2025-43968.json | 18 +++++++++ 2025/43xxx/CVE-2025-43969.json | 18 +++++++++ 2025/43xxx/CVE-2025-43970.json | 67 ++++++++++++++++++++++++++++++++++ 2025/43xxx/CVE-2025-43971.json | 67 ++++++++++++++++++++++++++++++++++ 2025/43xxx/CVE-2025-43972.json | 67 ++++++++++++++++++++++++++++++++++ 2025/43xxx/CVE-2025-43973.json | 67 ++++++++++++++++++++++++++++++++++ 6 files changed, 304 insertions(+) create mode 100644 2025/43xxx/CVE-2025-43968.json create mode 100644 2025/43xxx/CVE-2025-43969.json create mode 100644 2025/43xxx/CVE-2025-43970.json create mode 100644 2025/43xxx/CVE-2025-43971.json create mode 100644 2025/43xxx/CVE-2025-43972.json create mode 100644 2025/43xxx/CVE-2025-43973.json diff --git a/2025/43xxx/CVE-2025-43968.json b/2025/43xxx/CVE-2025-43968.json new file mode 100644 index 00000000000..1a430bb7741 --- /dev/null +++ b/2025/43xxx/CVE-2025-43968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-43968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/43xxx/CVE-2025-43969.json b/2025/43xxx/CVE-2025-43969.json new file mode 100644 index 00000000000..1e1f92e5c07 --- /dev/null +++ b/2025/43xxx/CVE-2025-43969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-43969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/43xxx/CVE-2025-43970.json b/2025/43xxx/CVE-2025-43970.json new file mode 100644 index 00000000000..5cafaed792a --- /dev/null +++ b/2025/43xxx/CVE-2025-43970.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2025-43970", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in GoBGP before 3.35.0. pkg/packet/mrt/mrt.go does not properly check the input length, e.g.. by ensuring that there are 12 bytes or 36 bytes (depending on the address family)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0" + }, + { + "url": "https://github.com/osrg/gobgp/commit/5153bafbe8dbe1a2f02a70bbf0365e98b80e47b0", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/commit/5153bafbe8dbe1a2f02a70bbf0365e98b80e47b0" + } + ] + } +} \ No newline at end of file diff --git a/2025/43xxx/CVE-2025-43971.json b/2025/43xxx/CVE-2025-43971.json new file mode 100644 index 00000000000..f7765cff871 --- /dev/null +++ b/2025/43xxx/CVE-2025-43971.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2025-43971", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in GoBGP before 3.35.0. pkg/packet/bgp/bgp.go allows attackers to cause a panic via a zero value for softwareVersionLen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0" + }, + { + "url": "https://github.com/osrg/gobgp/commit/08a001e06d90e8bcc190084c66992f46f62c0986", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/commit/08a001e06d90e8bcc190084c66992f46f62c0986" + } + ] + } +} \ No newline at end of file diff --git a/2025/43xxx/CVE-2025-43972.json b/2025/43xxx/CVE-2025-43972.json new file mode 100644 index 00000000000..541ce2a256a --- /dev/null +++ b/2025/43xxx/CVE-2025-43972.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2025-43972", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in GoBGP before 3.35.0. An attacker can cause a crash in the pkg/packet/bgp/bgp.go flowspec parser by sending fewer than 20 bytes in a certain context." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0" + }, + { + "url": "https://github.com/osrg/gobgp/commit/ca7383f450f7b296c5389feceef2467de5ab6e5a", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/commit/ca7383f450f7b296c5389feceef2467de5ab6e5a" + } + ] + } +} \ No newline at end of file diff --git a/2025/43xxx/CVE-2025-43973.json b/2025/43xxx/CVE-2025-43973.json new file mode 100644 index 00000000000..f40da35f764 --- /dev/null +++ b/2025/43xxx/CVE-2025-43973.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2025-43973", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/compare/v3.34.0...v3.35.0" + }, + { + "url": "https://github.com/osrg/gobgp/commit/5693c58a4815cc6327b8d3b6980f0e5aced28abe", + "refsource": "MISC", + "name": "https://github.com/osrg/gobgp/commit/5693c58a4815cc6327b8d3b6980f0e5aced28abe" + } + ] + } +} \ No newline at end of file