Auto-Update: 2025-06-08T12:00:21.735562+00:00

This commit is contained in:
cad-safe-bot 2025-06-08 12:03:58 +00:00
parent b5b393e5b3
commit f02c91d6ed
4 changed files with 599 additions and 522 deletions

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38003",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-06-08T11:15:20.990",
"lastModified": "2025-06-08T11:15:20.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add missing rcu read protection for procfs content\n\nWhen the procfs content is generated for a bcm_op which is in the process\nto be removed the procfs output might show unreliable data (UAF).\n\nAs the removal of bcm_op's is already implemented with rcu handling this\npatch adds the missing rcu_read_lock() and makes sure the list entries\nare properly removed under rcu protection."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0622846db728a5332b917c797c733e202c4620ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/19f553a1ddf260da6570ed8f8d91a8c87f49b63a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1f912f8484e9c4396378c39460bbea0af681f319",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/63567ecd99a24495208dc860d50fb17440043006",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/659701c0b954ccdb4a916a4ad59bbc16e726d42c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6d7d458c41b98a5c1670cbd36f2923c37de51cf5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7c9db92d5f0eadca30884af75c53d601edc512ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dac5e6249159ac255dad9781793dbe5908ac9ddb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38004",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-06-08T11:15:22.210",
"lastModified": "2025-06-08T11:15:22.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add locking for bcm_op runtime updates\n\nThe CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via\nhrtimer. The content and also the length of the sequence can be changed\nresp reduced at runtime where the 'currframe' counter is then set to zero.\n\nAlthough this appeared to be a safe operation the updates of 'currframe'\ncan be triggered from user space and hrtimer context in bcm_can_tx().\nAnderson Nascimento created a proof of concept that triggered a KASAN\nslab-out-of-bounds read access which can be prevented with a spin_lock_bh.\n\nAt the rework of bcm_can_tx() the 'count' variable has been moved into\nthe protected section as this variable can be modified from both contexts\ntoo."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2a437b86ac5a9893c902f30ef66815bf13587bf6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7595de7bc56e0e52b74e56c90f7e247bf626d628",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/76c84c3728178b2d38d5604e399dfe8b0752645e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8f1c022541bf5a923c8d6fa483112c15250f30a4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c4e8a172501e677ebd8ea9d9161d97dc4df56fbd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cc55dd28c20a6611e30596019b3b2f636819a4c0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fbd8fdc2b218e979cfe422b139b8f74c12419d1f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-08T02:00:20.759976+00:00
2025-06-08T12:00:21.735562+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-07T23:15:22.130000+00:00
2025-06-08T11:15:22.210000+00:00
```
### Last Data Feed Release
@ -33,44 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
296977
296979
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `2`
- [CVE-2025-38003](CVE-2025/CVE-2025-380xx/CVE-2025-38003.json) (`2025-06-08T11:15:20.990`)
- [CVE-2025-38004](CVE-2025/CVE-2025-380xx/CVE-2025-38004.json) (`2025-06-08T11:15:22.210`)
### CVEs modified in the last Commit
Recently modified CVEs: `492`
Recently modified CVEs: `0`
- [CVE-2025-5647](CVE-2025/CVE-2025-56xx/CVE-2025-5647.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5648](CVE-2025/CVE-2025-56xx/CVE-2025-5648.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5649](CVE-2025/CVE-2025-56xx/CVE-2025-5649.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5650](CVE-2025/CVE-2025-56xx/CVE-2025-5650.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5651](CVE-2025/CVE-2025-56xx/CVE-2025-5651.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5653](CVE-2025/CVE-2025-56xx/CVE-2025-5653.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5654](CVE-2025/CVE-2025-56xx/CVE-2025-5654.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5655](CVE-2025/CVE-2025-56xx/CVE-2025-5655.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5656](CVE-2025/CVE-2025-56xx/CVE-2025-5656.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5657](CVE-2025/CVE-2025-56xx/CVE-2025-5657.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5658](CVE-2025/CVE-2025-56xx/CVE-2025-5658.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5661](CVE-2025/CVE-2025-56xx/CVE-2025-5661.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5664](CVE-2025/CVE-2025-56xx/CVE-2025-5664.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5665](CVE-2025/CVE-2025-56xx/CVE-2025-5665.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5666](CVE-2025/CVE-2025-56xx/CVE-2025-5666.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5667](CVE-2025/CVE-2025-56xx/CVE-2025-5667.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5671](CVE-2025/CVE-2025-56xx/CVE-2025-5671.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5672](CVE-2025/CVE-2025-56xx/CVE-2025-5672.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5674](CVE-2025/CVE-2025-56xx/CVE-2025-5674.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5675](CVE-2025/CVE-2025-56xx/CVE-2025-5675.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5676](CVE-2025/CVE-2025-56xx/CVE-2025-5676.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5677](CVE-2025/CVE-2025-56xx/CVE-2025-5677.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5679](CVE-2025/CVE-2025-56xx/CVE-2025-5679.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5701](CVE-2025/CVE-2025-57xx/CVE-2025-5701.json) (`2025-06-05T20:12:23.777`)
- [CVE-2025-5702](CVE-2025/CVE-2025-57xx/CVE-2025-5702.json) (`2025-06-05T21:15:22.873`)
## Download and Usage

File diff suppressed because it is too large Load Diff