mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-20T10:00:19.920732+00:00
This commit is contained in:
parent
d43c33c9f3
commit
ecd26efe72
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22026",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:15:55.237",
|
||||
"lastModified": "2025-04-17T20:22:16.240",
|
||||
"lastModified": "2025-04-20T09:15:13.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -13,6 +13,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/930b64ca0c511521f0abdd1d57ce52b2a6e3476b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -20,6 +24,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9d9456185fd5f1891c74354ee297f19538141ead",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e31957a819e60cf0bc9a49408765e6095fd3d046",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-378xx/CVE-2025-37838.json
Normal file
33
CVE-2025/CVE-2025-378xx/CVE-2025-37838.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-37838",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-18T15:15:59.090",
|
||||
"lastModified": "2025-04-20T09:15:14.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition\n\nIn the ssi_protocol_probe() function, &ssi->work is bound with\nssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function\nwithin the ssip_pn_ops structure is capable of starting the\nwork.\n\nIf we remove the module which will call ssi_protocol_remove()\nto make a cleanup, it will free ssi through kfree(ssi),\nwhile the work mentioned above will be used. The sequence\nof operations that may lead to a UAF bug is as follows:\n\nCPU0 CPU1\n\n | ssip_xmit_work\nssi_protocol_remove |\nkfree(ssi); |\n | struct hsi_client *cl = ssi->cl;\n | // use ssi\n\nFix it by ensuring that the work is canceled before proceeding\nwith the cleanup in ssi_protocol_remove()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4b4194c9a7a8f92db39e8e86c85f4fb12ebbec4f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/834e602d0cc7c743bfce734fad4a46cefc0f9ab1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ae5a6a0b425e8f76a9f0677e50796e494e89b088",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e3f88665a78045fe35c7669d2926b8d97b892c11",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
11
README.md
11
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-20T08:00:19.838179+00:00
|
||||
2025-04-20T10:00:19.920732+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-20T07:15:28.407000+00:00
|
||||
2025-04-20T09:15:14.010000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
290932
|
||||
290933
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2025-3822](CVE-2025/CVE-2025-38xx/CVE-2025-3822.json) (`2025-04-20T07:15:28.407`)
|
||||
- [CVE-2025-37838](CVE-2025/CVE-2025-378xx/CVE-2025-37838.json) (`2025-04-18T15:15:59.090`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2025-22026](CVE-2025/CVE-2025-220xx/CVE-2025-22026.json) (`2025-04-20T09:15:13.753`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
@ -283909,7 +283909,7 @@ CVE-2025-22022,0,0,b0b2a4f36ca18aafe7086db06e42627cd041ca4416e5acd924bba4ad965a4
|
||||
CVE-2025-22023,0,0,3b6cd95ee61722f71d40c3efcbcb19a8146f1840e01fc126c70623b0dacf8288,2025-04-16T13:25:37.340000
|
||||
CVE-2025-22024,0,0,e8dac82476abeaf332c305f17247a4393a5f469d14e8a6131ed28a6b5095cb6e,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22025,0,0,c7c9fd4898dd8e1f247adeb18f8ad976ae8855aaa7a3a0a826a5edd191f0fdef,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22026,0,0,b8ea2511e265dcfaeaf5497edd94c6d96e792743ec4123fbda60b708f258bdf0,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22026,0,1,77c6715bd31e1530cf370dce65fcf3768219ef0d6106056bf5ec0f56ae1f8546,2025-04-20T09:15:13.753000
|
||||
CVE-2025-22027,0,0,0abcb6f036ec1dd8f2ea4b88550d7b1a15d373b7663a559bcb6ecf09c222fb61,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22028,0,0,fb670058b3af52f22ed9980eceb6b87da3f2db1b42eafdf76394c7bf27e0b4b4,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22029,0,0,b95b9e68f8da175bfc9d87f9425b5097e66d98e23c3297f2b7442fbc56fd621b,2025-04-17T20:22:16.240000
|
||||
@ -290728,6 +290728,7 @@ CVE-2025-3764,0,0,192085e50203a378873b0fba70930bdb42ca705b402010a5434576b8a6b54b
|
||||
CVE-2025-3765,0,0,1013acbb24b428a59ff55984fd6a510ede3b7a74d0f6249931765b20d6806ee3,2025-04-17T20:21:05.203000
|
||||
CVE-2025-37785,0,0,d1677744e4fd24c8bd92b8a55f4c8d0bec09cee0605b6a9d6cda47a6bcc25038,2025-04-18T07:15:42.693000
|
||||
CVE-2025-3783,0,0,ddbcb921161bf63cec3f579eaec58f70f8a8dfa643f04e0ce7a8486882dcde94,2025-04-18T12:15:16.090000
|
||||
CVE-2025-37838,1,1,8021aa0afe7d4fcb835302b91b542c1c6f0037fab1ccdee5e207f25f1347dc0f,2025-04-20T09:15:14.010000
|
||||
CVE-2025-3785,0,0,236ad99200e5878fdb9f3e18ec24b6c983e775ad5235198974342d132d554d98,2025-04-18T09:15:15.440000
|
||||
CVE-2025-3786,0,0,b16fc5c7479e78a8d815be2276f6ba56296c72c52af6d9dc2764fd0661c7c4cf,2025-04-18T12:15:16.293000
|
||||
CVE-2025-37860,0,0,ca02d2514d9266bbb11e2189aebda900299cc4fe894a8aee0917673becd019cc,2025-04-18T07:15:42.883000
|
||||
@ -290761,7 +290762,7 @@ CVE-2025-3818,0,0,becc0d92806ccaaa15c607aa85c5ec6443bc3617d8777f2f23a8a11191e6c7
|
||||
CVE-2025-3819,0,0,364377ad54d70df860fc9ec00ab9e1d4d8eb233351a7f92ce1289b9b90b3f645,2025-04-19T20:15:15.720000
|
||||
CVE-2025-3820,0,0,bd63f641be19cb790a0f0ceb45fc52d02a8f7828a89af0f8ffc659042a7d1628,2025-04-19T21:15:45.660000
|
||||
CVE-2025-3821,0,0,d858b31c07c0d51da5c674b08505aa8e0806ebde89ea307526d32e0a41895c21,2025-04-20T04:15:20.610000
|
||||
CVE-2025-3822,1,1,ea516a66da392b94100ba03e49146fb36805f8eb91db2f30ea934b47f2e75a27,2025-04-20T07:15:28.407000
|
||||
CVE-2025-3822,0,0,ea516a66da392b94100ba03e49146fb36805f8eb91db2f30ea934b47f2e75a27,2025-04-20T07:15:28.407000
|
||||
CVE-2025-38240,0,0,55c3c53507175385d390f4e5f0701155663d7d45488ce3854f0ce48d67d704f4,2025-04-18T07:15:43.510000
|
||||
CVE-2025-38479,0,0,b2b6ea65e240d4ffeed782b9d037d3b3cf1f0ae1e3ce4a6e40a815527e135169,2025-04-18T07:15:43.613000
|
||||
CVE-2025-38575,0,0,fc45fd45a431f685538b4001e1e87131d23faf0a16a9209a56843479513a7e70,2025-04-18T07:15:43.717000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user