"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-05-08 11:00:39 +00:00
parent 6820d7bbc9
commit 3b441574a9
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
10 changed files with 167 additions and 547 deletions

View File

@ -1,17 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-49843",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -1,17 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-49856",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -1,17 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-49897",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,139 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2023-53104",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull\n\nPacket length check needs to be located after size and align_count\ncalculation to prevent kernel panic in skb_pull() in case\nrx_cmd_a & RX_CMD_A_RED evaluates to true."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "4a4de0a68b18485c68ab4f0cfa665b1633c6d277",
"version_value": "5c96eeba93980c5cef5176a4bac0ddb722fd57dc"
},
{
"version_affected": "<",
"version_name": "53966d572d056d6b234cfe76a5f9d60049d3c178",
"version_value": "89441504d66d116eb5ce58c132f58cdcca5b498a"
},
{
"version_affected": "<",
"version_name": "9fabdd79051a9fe51388df099aff6e4b660fedd2",
"version_value": "e0d07a3203c36d073af2177edfc6b070220a60cb"
},
{
"version_affected": "<",
"version_name": "e294f0aa47e4844f3d3c8766c02accd5a76a7d4e",
"version_value": "2cc46ed406bb325f10a251b03d9a83ae67b3d3d8"
},
{
"version_affected": "<",
"version_name": "105db6574281e1e03fcbf87983f4fee111682306",
"version_value": "7bf0eac3fdd2d25f5c6ceab63e3e4902e274f7ee"
},
{
"version_affected": "<",
"version_name": "c7bdc137ca163b90917c1eeba4f1937684bd4f8b",
"version_value": "4caee8e7d91e4f06f21881726da9c1bb2cd6e4fa"
},
{
"version_affected": "<",
"version_name": "8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6",
"version_value": "181e9db5caec4daae57a58675a1ceaa47348958f"
},
{
"version_affected": "<",
"version_name": "d8b228318935044dafe3a5bc07ee71a1f1424b8d",
"version_value": "43ffe6caccc7a1bb9d7442fbab521efbf6c1378c"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/5c96eeba93980c5cef5176a4bac0ddb722fd57dc",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5c96eeba93980c5cef5176a4bac0ddb722fd57dc"
},
{
"url": "https://git.kernel.org/stable/c/89441504d66d116eb5ce58c132f58cdcca5b498a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/89441504d66d116eb5ce58c132f58cdcca5b498a"
},
{
"url": "https://git.kernel.org/stable/c/e0d07a3203c36d073af2177edfc6b070220a60cb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e0d07a3203c36d073af2177edfc6b070220a60cb"
},
{
"url": "https://git.kernel.org/stable/c/2cc46ed406bb325f10a251b03d9a83ae67b3d3d8",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2cc46ed406bb325f10a251b03d9a83ae67b3d3d8"
},
{
"url": "https://git.kernel.org/stable/c/7bf0eac3fdd2d25f5c6ceab63e3e4902e274f7ee",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7bf0eac3fdd2d25f5c6ceab63e3e4902e274f7ee"
},
{
"url": "https://git.kernel.org/stable/c/4caee8e7d91e4f06f21881726da9c1bb2cd6e4fa",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4caee8e7d91e4f06f21881726da9c1bb2cd6e4fa"
},
{
"url": "https://git.kernel.org/stable/c/181e9db5caec4daae57a58675a1ceaa47348958f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/181e9db5caec4daae57a58675a1ceaa47348958f"
},
{
"url": "https://git.kernel.org/stable/c/43ffe6caccc7a1bb9d7442fbab521efbf6c1378c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/43ffe6caccc7a1bb9d7442fbab521efbf6c1378c"
}
]
},
"generator": {
"engine": "bippy-1.1.0"
}
}

View File

@ -5,89 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2023-53122",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRISC-V: fix taking the text_mutex twice during sifive errata patching\n\nChris pointed out that some bonehead, *cough* me *cough*, added two\nmutex_locks() to the SiFive errata patching. The second was meant to\nhave been a mutex_unlock().\n\nThis results in errors such as\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000030\nOops [#1]\nModules linked in:\nCPU: 0 PID: 0 Comm: swapper Not tainted\n6.2.0-rc1-starlight-00079-g9493e6f3ce02 #229\nHardware name: BeagleV Starlight Beta (DT)\nepc : __schedule+0x42/0x500\n ra : schedule+0x46/0xce\nepc : ffffffff8065957c ra : ffffffff80659a80 sp : ffffffff81203c80\n gp : ffffffff812d50a0 tp : ffffffff8120db40 t0 : ffffffff81203d68\n t1 : 0000000000000001 t2 : 4c45203a76637369 s0 : ffffffff81203cf0\n s1 : ffffffff8120db40 a0 : 0000000000000000 a1 : ffffffff81213958\n a2 : ffffffff81213958 a3 : 0000000000000000 a4 : 0000000000000000\n a5 : ffffffff80a1bd00 a6 : 0000000000000000 a7 : 0000000052464e43\n s2 : ffffffff8120db41 s3 : ffffffff80a1ad00 s4 : 0000000000000000\n s5 : 0000000000000002 s6 : ffffffff81213938 s7 : 0000000000000000\n s8 : 0000000000000000 s9 : 0000000000000001 s10: ffffffff812d7204\n s11: ffffffff80d3c920 t3 : 0000000000000001 t4 : ffffffff812e6dd7\n t5 : ffffffff812e6dd8 t6 : ffffffff81203bb8\nstatus: 0000000200000100 badaddr: 0000000000000030 cause: 000000000000000d\n[<ffffffff80659a80>] schedule+0x46/0xce\n[<ffffffff80659dce>] schedule_preempt_disabled+0x16/0x28\n[<ffffffff8065ae0c>] __mutex_lock.constprop.0+0x3fe/0x652\n[<ffffffff8065b138>] __mutex_lock_slowpath+0xe/0x16\n[<ffffffff8065b182>] mutex_lock+0x42/0x4c\n[<ffffffff8000ad94>] sifive_errata_patch_func+0xf6/0x18c\n[<ffffffff80002b92>] _apply_alternatives+0x74/0x76\n[<ffffffff80802ee8>] apply_boot_alternatives+0x3c/0xfa\n[<ffffffff80803cb0>] setup_arch+0x60c/0x640\n[<ffffffff80800926>] start_kernel+0x8e/0x99c\n---[ end trace 0000000000000000 ]---\n\n[Palmer: pick up Geert's bug report from the thread]"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0fad198fffdabdeb07f6471f3311a246a9b35e7c",
"version_value": "2feac714c6818f7767cfc21a3c10fa926b7398a3"
},
{
"version_affected": "<",
"version_name": "f4fda52262d803bbaf554296d281d593dc4bf707",
"version_value": "96a1600461957731b6d8ff3563c9f94b315bdaa1"
},
{
"version_affected": "<",
"version_name": "9493e6f3ce02f44c21aa19f3cbf3b9aa05479d06",
"version_value": "bf89b7ee52af5a5944fa3539e86089f72475055b"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/2feac714c6818f7767cfc21a3c10fa926b7398a3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2feac714c6818f7767cfc21a3c10fa926b7398a3"
},
{
"url": "https://git.kernel.org/stable/c/96a1600461957731b6d8ff3563c9f94b315bdaa1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/96a1600461957731b6d8ff3563c9f94b315bdaa1"
},
{
"url": "https://git.kernel.org/stable/c/bf89b7ee52af5a5944fa3539e86089f72475055b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bf89b7ee52af5a5944fa3539e86089f72475055b"
}
]
},
"generator": {
"engine": "bippy-1.1.0"
}
}

View File

@ -5,119 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2023-53129",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: Fix deadlock during directory rename\n\nAs lockdep properly warns, we should not be locking i_rwsem while having\ntransactions started as the proper lock ordering used by all directory\nhandling operations is i_rwsem -> transaction start. Fix the lock\nordering by moving the locking of the directory earlier in\next4_rename()."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "8dac5a63cf79707b547ea3d425fead5f4482198f",
"version_value": "6b06c4ae64e3557a19b3bb0b6dbf641bc41fc218"
},
{
"version_affected": "<",
"version_name": "0c440f14558bfacd22c6935ae1fd4b2a09e96b5d",
"version_value": "b113f90204479f55a17295bedf0cc966a60c7a56"
},
{
"version_affected": "<",
"version_name": "c50fc503ee1b97f12c98e26afc39fdaebebcf04f",
"version_value": "a2bc806e95bde8de3a0d675051d9ae78dcf6c691"
},
{
"version_affected": "<",
"version_name": "b0bb13612292ca90fa4c2a7e425375649bc50d3e",
"version_value": "2ef7f829214fa8f428d953b49557b89b2b02db66"
},
{
"version_affected": "<",
"version_name": "291cd19d107e197306869cb3237c1bba62d13182",
"version_value": "352c728653a1179ce7bb37a4c8aa8404d83914a2"
},
{
"version_affected": "<",
"version_name": "0813299c586b175d7edb25f56412c54b812d0379",
"version_value": "3c92792da8506a295afb6d032b4476e46f979725"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/6b06c4ae64e3557a19b3bb0b6dbf641bc41fc218",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/6b06c4ae64e3557a19b3bb0b6dbf641bc41fc218"
},
{
"url": "https://git.kernel.org/stable/c/b113f90204479f55a17295bedf0cc966a60c7a56",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b113f90204479f55a17295bedf0cc966a60c7a56"
},
{
"url": "https://git.kernel.org/stable/c/a2bc806e95bde8de3a0d675051d9ae78dcf6c691",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a2bc806e95bde8de3a0d675051d9ae78dcf6c691"
},
{
"url": "https://git.kernel.org/stable/c/2ef7f829214fa8f428d953b49557b89b2b02db66",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2ef7f829214fa8f428d953b49557b89b2b02db66"
},
{
"url": "https://git.kernel.org/stable/c/352c728653a1179ce7bb37a4c8aa8404d83914a2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/352c728653a1179ce7bb37a4c8aa8404d83914a2"
},
{
"url": "https://git.kernel.org/stable/c/3c92792da8506a295afb6d032b4476e46f979725",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3c92792da8506a295afb6d032b4476e46f979725"
}
]
},
"generator": {
"engine": "bippy-1.1.0"
}
}

View File

@ -5,89 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2023-53130",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix wrong mode for blkdev_put() from disk_scan_partitions()\n\nIf disk_scan_partitions() is called with 'FMODE_EXCL',\nblkdev_get_by_dev() will be called without 'FMODE_EXCL', however, follow\nblkdev_put() is still called with 'FMODE_EXCL', which will cause\n'bd_holders' counter to leak.\n\nFix the problem by using the right mode for blkdev_put()."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "82f713e8b8817ddaec8e5670c275e2a0570bf812",
"version_value": "e5febcfbae9396fb3f064a2a14368c3d77d73ad4"
},
{
"version_affected": "<",
"version_name": "1bc96d30a7636abda26ff5c35ec0fc3328354619",
"version_value": "d81c6c98d45311a7f3abff4bd5e1eb8e5089972e"
},
{
"version_affected": "<",
"version_name": "e5cfefa97bccf956ea0bb6464c1f6c84fd7a8d9f",
"version_value": "428913bce1e67ccb4dae317fd0332545bf8c9233"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/e5febcfbae9396fb3f064a2a14368c3d77d73ad4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e5febcfbae9396fb3f064a2a14368c3d77d73ad4"
},
{
"url": "https://git.kernel.org/stable/c/d81c6c98d45311a7f3abff4bd5e1eb8e5089972e",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d81c6c98d45311a7f3abff4bd5e1eb8e5089972e"
},
{
"url": "https://git.kernel.org/stable/c/428913bce1e67ccb4dae317fd0332545bf8c9233",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/428913bce1e67ccb4dae317fd0332545bf8c9233"
}
]
},
"generator": {
"engine": "bippy-1.1.0"
}
}

View File

@ -5,149 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2025-23139",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_uart: Fix another race during initialization\n\nDo not set 'HCI_UART_PROTO_READY' before call 'hci_uart_register_dev()'.\nPossible race is when someone calls 'hci_tty_uart_close()' after this bit\nis set, but 'hci_uart_register_dev()' wasn't done. This leads to access\nto uninitialized fields. To fix it let's set this bit after device was\nregistered (as before patch c411c62cc133) and to fix previous problem let's\nadd one more bit in addition to 'HCI_UART_PROTO_READY' which allows to\nperform power up without original bit set (pls see commit c411c62cc133).\n\nCrash backtrace from syzbot report:\n\nRIP: 0010:skb_queue_empty_lockless include/linux/skbuff.h:1887 [inline]\nRIP: 0010:skb_queue_purge_reason+0x6d/0x140 net/core/skbuff.c:3936\n\nCall Trace:\n <TASK>\n skb_queue_purge include/linux/skbuff.h:3364 [inline]\n mrvl_close+0x2f/0x90 drivers/bluetooth/hci_mrvl.c:100\n hci_uart_tty_close+0xb6/0x120 drivers/bluetooth/hci_ldisc.c:557\n tty_ldisc_close drivers/tty/tty_ldisc.c:455 [inline]\n tty_ldisc_kill+0x66/0xc0 drivers/tty/tty_ldisc.c:613\n tty_ldisc_release+0xc9/0x120 drivers/tty/tty_ldisc.c:781\n tty_release_struct+0x10/0x80 drivers/tty/tty_io.c:1690\n tty_release+0x4ef/0x640 drivers/tty/tty_io.c:1861\n __fput+0x86/0x2a0 fs/file_table.c:450\n task_work_run+0x82/0xb0 kernel/task_work.c:239\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:114 [inline]\n exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]\n __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]\n syscall_exit_to_user_mode+0xa3/0x1b0 kernel/entry/common.c:218\n do_syscall_64+0x9a/0x190 arch/x86/entry/common.c:89\n entry_SYSCALL_64_after_hwframe+0x77/0x7f"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "48effdb7a798232db945503cf3f51e0be8070cea",
"version_value": "1dcf08fcff5ca529de6dc0395091f28854f4e54a"
},
{
"version_affected": "<",
"version_name": "45fa7bd82c6178f4fec0ab94891144a043ec5fe8",
"version_value": "a40f94f7caa8d3421b64f63ac31bc0f24c890f39"
},
{
"version_affected": "<",
"version_name": "d71a57a34ab6bbc95dc461158403c02e8ff3f912",
"version_value": "9e5a0f5777162e503400c70c6ed25fbbe2d38799"
},
{
"version_affected": "<",
"version_name": "9cf7dccaa7f4c56d2089700e5cb11f85a8d5f6cf",
"version_value": "80f14e9de6a43a0bd8194cad1003a3e6dcbc3984"
},
{
"version_affected": "<",
"version_name": "806464634e7fc6b523160defeeddb1ade2a72f81",
"version_value": "02e1bcdfdf769974e7e9fa285e295cd9852e2a38"
},
{
"version_affected": "<",
"version_name": "6b7a32fa9bacdebd98c18b2a56994116995ee643",
"version_value": "281782d2c6730241e300d630bb9f200d831ede71"
},
{
"version_affected": "<",
"version_name": "15543b7bbe7b5f744fdbb44f75b14f81a0117813",
"version_value": "8e5aff600539e5faea294d9612cca50220e602b8"
},
{
"version_affected": "<",
"version_name": "a4b89a45b12b69bc82c8137346b150a118e02c26",
"version_value": "db7509fa110dd9b11134b75894677f30353b2c51"
},
{
"version_affected": "<",
"version_name": "366ceff495f902182d42b6f41525c2474caf3f9a",
"version_value": "5df5dafc171b90d0b8d51547a82657cd5a1986c7"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/1dcf08fcff5ca529de6dc0395091f28854f4e54a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1dcf08fcff5ca529de6dc0395091f28854f4e54a"
},
{
"url": "https://git.kernel.org/stable/c/a40f94f7caa8d3421b64f63ac31bc0f24c890f39",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a40f94f7caa8d3421b64f63ac31bc0f24c890f39"
},
{
"url": "https://git.kernel.org/stable/c/9e5a0f5777162e503400c70c6ed25fbbe2d38799",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/9e5a0f5777162e503400c70c6ed25fbbe2d38799"
},
{
"url": "https://git.kernel.org/stable/c/80f14e9de6a43a0bd8194cad1003a3e6dcbc3984",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/80f14e9de6a43a0bd8194cad1003a3e6dcbc3984"
},
{
"url": "https://git.kernel.org/stable/c/02e1bcdfdf769974e7e9fa285e295cd9852e2a38",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/02e1bcdfdf769974e7e9fa285e295cd9852e2a38"
},
{
"url": "https://git.kernel.org/stable/c/281782d2c6730241e300d630bb9f200d831ede71",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/281782d2c6730241e300d630bb9f200d831ede71"
},
{
"url": "https://git.kernel.org/stable/c/8e5aff600539e5faea294d9612cca50220e602b8",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8e5aff600539e5faea294d9612cca50220e602b8"
},
{
"url": "https://git.kernel.org/stable/c/db7509fa110dd9b11134b75894677f30353b2c51",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/db7509fa110dd9b11134b75894677f30353b2c51"
},
{
"url": "https://git.kernel.org/stable/c/5df5dafc171b90d0b8d51547a82657cd5a1986c7",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5df5dafc171b90d0b8d51547a82657cd5a1986c7"
}
]
},
"generator": {
"engine": "bippy-1.1.0"
}
}

View File

@ -1,18 +1,90 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3758",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cvd@cert.pl",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "WF2220 exposes endpoint\u00a0/cgi-bin-igd/netcore_get.cgi\u00a0that returns configuration of the device to unauthorized users. Returned configuration includes cleartext password.\nThe vendor was contacted early about this disclosure but did not respond in any way."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-306 Missing Authentication for Critical Function",
"cweId": "CWE-306"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-311 Missing Encryption of Sensitive Data",
"cweId": "CWE-311"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Netis Systems",
"product": {
"product_data": [
{
"product_name": "WF2220",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.2.31706"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert.pl/posts/2025/05/CVE-2025-3758",
"refsource": "MISC",
"name": "https://cert.pl/posts/2025/05/CVE-2025-3758"
},
{
"url": "https://cert.pl/en/posts/2025/05/CVE-2025-3758",
"refsource": "MISC",
"name": "https://cert.pl/en/posts/2025/05/CVE-2025-3758"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Kamil Szczurowski"
}
]
}

View File

@ -1,18 +1,81 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3759",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cvd@cert.pl",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Endpoint\u00a0/cgi-bin-igd/netcore_set.cgi\u00a0which is used for changing device configuration is accessible without authentication. This poses a significant security threat allowing for e.g: administrator account hijacking or AP password changing.\nThe vendor was contacted early about this disclosure but did not respond in any way."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-306 Missing Authentication for Critical Function",
"cweId": "CWE-306"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Netis Systems",
"product": {
"product_data": [
{
"product_name": "WF2220",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.2.31706"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert.pl/posts/2025/05/CVE-2025-3758",
"refsource": "MISC",
"name": "https://cert.pl/posts/2025/05/CVE-2025-3758"
},
{
"url": "https://cert.pl/en/posts/2025/05/CVE-2025-3758",
"refsource": "MISC",
"name": "https://cert.pl/en/posts/2025/05/CVE-2025-3758"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Kamil Szczurowski"
}
]
}