"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-03-25 02:00:31 +00:00
parent f2da121383
commit c7ce44475a
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
5 changed files with 672 additions and 123 deletions

View File

@ -5,127 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2025-21757",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels\n\ndst_cache_get() gives us a reference, we need to release it.\n\nDiscovered by the ioam6.sh test, kmemleak was recently fixed\nto catch per-cpu memory leaks."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "b26f015dfb07b6be12d005a0ed0c5c43b7bedbf3",
"version_value": "cb9950eaaf9cc76dfe490c06aa11f185b3c7f22b"
},
{
"version_affected": "<",
"version_name": "634710a372ba65bee667c2f6e58a97658c639eab",
"version_value": "bf500b0d0cfe92ee62dfd4c2ace7f6353cf3a4c8"
},
{
"version_affected": "<",
"version_name": "8471e228448a818e4c27cab4b681b2e758e46cf5",
"version_value": "2248b8145053eb2ae35ca4cf694b885a086719bb"
},
{
"version_affected": "<",
"version_name": "c432cd18a07b623651ed15ea167bd303467004cc",
"version_value": "d90f8f930c3053bb11f5def9aff5310a70429260"
},
{
"version_affected": "<",
"version_name": "985ec6f5e6235242191370628acb73d7a9f0c0ea",
"version_value": "c71a192976ded2f2f416d03c4f595cdd4478b825"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "6.14-rc1",
"status": "affected"
},
{
"version": "0",
"lessThan": "6.14-rc1",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.14-rc2",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/cb9950eaaf9cc76dfe490c06aa11f185b3c7f22b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cb9950eaaf9cc76dfe490c06aa11f185b3c7f22b"
},
{
"url": "https://git.kernel.org/stable/c/bf500b0d0cfe92ee62dfd4c2ace7f6353cf3a4c8",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bf500b0d0cfe92ee62dfd4c2ace7f6353cf3a4c8"
},
{
"url": "https://git.kernel.org/stable/c/2248b8145053eb2ae35ca4cf694b885a086719bb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2248b8145053eb2ae35ca4cf694b885a086719bb"
},
{
"url": "https://git.kernel.org/stable/c/d90f8f930c3053bb11f5def9aff5310a70429260",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d90f8f930c3053bb11f5def9aff5310a70429260"
},
{
"url": "https://git.kernel.org/stable/c/c71a192976ded2f2f416d03c4f595cdd4478b825",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c71a192976ded2f2f416d03c4f595cdd4478b825"
}
]
},
"generator": {
"engine": "bippy-5f407fcff5a0"
}
}

View File

@ -1,17 +1,330 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-2723",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in GNOME libgsf bis 1.14.53 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion gsf_property_settings_collec. Durch die Manipulation des Arguments n_alloced_params mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "libgsf",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
},
{
"version_affected": "=",
"version_value": "1.14.7"
},
{
"version_affected": "=",
"version_value": "1.14.8"
},
{
"version_affected": "=",
"version_value": "1.14.9"
},
{
"version_affected": "=",
"version_value": "1.14.10"
},
{
"version_affected": "=",
"version_value": "1.14.11"
},
{
"version_affected": "=",
"version_value": "1.14.12"
},
{
"version_affected": "=",
"version_value": "1.14.13"
},
{
"version_affected": "=",
"version_value": "1.14.14"
},
{
"version_affected": "=",
"version_value": "1.14.15"
},
{
"version_affected": "=",
"version_value": "1.14.16"
},
{
"version_affected": "=",
"version_value": "1.14.17"
},
{
"version_affected": "=",
"version_value": "1.14.18"
},
{
"version_affected": "=",
"version_value": "1.14.19"
},
{
"version_affected": "=",
"version_value": "1.14.20"
},
{
"version_affected": "=",
"version_value": "1.14.21"
},
{
"version_affected": "=",
"version_value": "1.14.22"
},
{
"version_affected": "=",
"version_value": "1.14.23"
},
{
"version_affected": "=",
"version_value": "1.14.24"
},
{
"version_affected": "=",
"version_value": "1.14.25"
},
{
"version_affected": "=",
"version_value": "1.14.26"
},
{
"version_affected": "=",
"version_value": "1.14.27"
},
{
"version_affected": "=",
"version_value": "1.14.28"
},
{
"version_affected": "=",
"version_value": "1.14.29"
},
{
"version_affected": "=",
"version_value": "1.14.30"
},
{
"version_affected": "=",
"version_value": "1.14.31"
},
{
"version_affected": "=",
"version_value": "1.14.32"
},
{
"version_affected": "=",
"version_value": "1.14.33"
},
{
"version_affected": "=",
"version_value": "1.14.34"
},
{
"version_affected": "=",
"version_value": "1.14.35"
},
{
"version_affected": "=",
"version_value": "1.14.36"
},
{
"version_affected": "=",
"version_value": "1.14.37"
},
{
"version_affected": "=",
"version_value": "1.14.38"
},
{
"version_affected": "=",
"version_value": "1.14.39"
},
{
"version_affected": "=",
"version_value": "1.14.40"
},
{
"version_affected": "=",
"version_value": "1.14.41"
},
{
"version_affected": "=",
"version_value": "1.14.42"
},
{
"version_affected": "=",
"version_value": "1.14.43"
},
{
"version_affected": "=",
"version_value": "1.14.44"
},
{
"version_affected": "=",
"version_value": "1.14.45"
},
{
"version_affected": "=",
"version_value": "1.14.46"
},
{
"version_affected": "=",
"version_value": "1.14.47"
},
{
"version_affected": "=",
"version_value": "1.14.48"
},
{
"version_affected": "=",
"version_value": "1.14.49"
},
{
"version_affected": "=",
"version_value": "1.14.50"
},
{
"version_affected": "=",
"version_value": "1.14.51"
},
{
"version_affected": "=",
"version_value": "1.14.52"
},
{
"version_affected": "=",
"version_value": "1.14.53"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.300743",
"refsource": "MISC",
"name": "https://vuldb.com/?id.300743"
},
{
"url": "https://vuldb.com/?ctiid.300743",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.300743"
},
{
"url": "https://vuldb.com/?submit.520183",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.520183"
},
{
"url": "https://www.gnome.org/",
"refsource": "MISC",
"name": "https://www.gnome.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "ninpwn (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,330 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-2724",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in GNOME libgsf bis 1.14.53 entdeckt. Betroffen hiervon ist die Funktion sorting_key_copy. Durch Manipulation des Arguments Name mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read",
"cweId": "CWE-125"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "libgsf",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
},
{
"version_affected": "=",
"version_value": "1.14.7"
},
{
"version_affected": "=",
"version_value": "1.14.8"
},
{
"version_affected": "=",
"version_value": "1.14.9"
},
{
"version_affected": "=",
"version_value": "1.14.10"
},
{
"version_affected": "=",
"version_value": "1.14.11"
},
{
"version_affected": "=",
"version_value": "1.14.12"
},
{
"version_affected": "=",
"version_value": "1.14.13"
},
{
"version_affected": "=",
"version_value": "1.14.14"
},
{
"version_affected": "=",
"version_value": "1.14.15"
},
{
"version_affected": "=",
"version_value": "1.14.16"
},
{
"version_affected": "=",
"version_value": "1.14.17"
},
{
"version_affected": "=",
"version_value": "1.14.18"
},
{
"version_affected": "=",
"version_value": "1.14.19"
},
{
"version_affected": "=",
"version_value": "1.14.20"
},
{
"version_affected": "=",
"version_value": "1.14.21"
},
{
"version_affected": "=",
"version_value": "1.14.22"
},
{
"version_affected": "=",
"version_value": "1.14.23"
},
{
"version_affected": "=",
"version_value": "1.14.24"
},
{
"version_affected": "=",
"version_value": "1.14.25"
},
{
"version_affected": "=",
"version_value": "1.14.26"
},
{
"version_affected": "=",
"version_value": "1.14.27"
},
{
"version_affected": "=",
"version_value": "1.14.28"
},
{
"version_affected": "=",
"version_value": "1.14.29"
},
{
"version_affected": "=",
"version_value": "1.14.30"
},
{
"version_affected": "=",
"version_value": "1.14.31"
},
{
"version_affected": "=",
"version_value": "1.14.32"
},
{
"version_affected": "=",
"version_value": "1.14.33"
},
{
"version_affected": "=",
"version_value": "1.14.34"
},
{
"version_affected": "=",
"version_value": "1.14.35"
},
{
"version_affected": "=",
"version_value": "1.14.36"
},
{
"version_affected": "=",
"version_value": "1.14.37"
},
{
"version_affected": "=",
"version_value": "1.14.38"
},
{
"version_affected": "=",
"version_value": "1.14.39"
},
{
"version_affected": "=",
"version_value": "1.14.40"
},
{
"version_affected": "=",
"version_value": "1.14.41"
},
{
"version_affected": "=",
"version_value": "1.14.42"
},
{
"version_affected": "=",
"version_value": "1.14.43"
},
{
"version_affected": "=",
"version_value": "1.14.44"
},
{
"version_affected": "=",
"version_value": "1.14.45"
},
{
"version_affected": "=",
"version_value": "1.14.46"
},
{
"version_affected": "=",
"version_value": "1.14.47"
},
{
"version_affected": "=",
"version_value": "1.14.48"
},
{
"version_affected": "=",
"version_value": "1.14.49"
},
{
"version_affected": "=",
"version_value": "1.14.50"
},
{
"version_affected": "=",
"version_value": "1.14.51"
},
{
"version_affected": "=",
"version_value": "1.14.52"
},
{
"version_affected": "=",
"version_value": "1.14.53"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.300744",
"refsource": "MISC",
"name": "https://vuldb.com/?id.300744"
},
{
"url": "https://vuldb.com/?ctiid.300744",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.300744"
},
{
"url": "https://vuldb.com/?submit.520184",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.520184"
},
{
"url": "https://www.gnome.org/",
"refsource": "MISC",
"name": "https://www.gnome.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "ninpwn (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 1.7,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-2783",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-2784",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}