mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-08T12:00:21.735562+00:00
This commit is contained in:
parent
b5b393e5b3
commit
f02c91d6ed
49
CVE-2025/CVE-2025-380xx/CVE-2025-38003.json
Normal file
49
CVE-2025/CVE-2025-380xx/CVE-2025-38003.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2025-38003",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-06-08T11:15:20.990",
|
||||
"lastModified": "2025-06-08T11:15:20.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add missing rcu read protection for procfs content\n\nWhen the procfs content is generated for a bcm_op which is in the process\nto be removed the procfs output might show unreliable data (UAF).\n\nAs the removal of bcm_op's is already implemented with rcu handling this\npatch adds the missing rcu_read_lock() and makes sure the list entries\nare properly removed under rcu protection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0622846db728a5332b917c797c733e202c4620ae",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/19f553a1ddf260da6570ed8f8d91a8c87f49b63a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f912f8484e9c4396378c39460bbea0af681f319",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/63567ecd99a24495208dc860d50fb17440043006",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/659701c0b954ccdb4a916a4ad59bbc16e726d42c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6d7d458c41b98a5c1670cbd36f2923c37de51cf5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7c9db92d5f0eadca30884af75c53d601edc512ee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dac5e6249159ac255dad9781793dbe5908ac9ddb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
49
CVE-2025/CVE-2025-380xx/CVE-2025-38004.json
Normal file
49
CVE-2025/CVE-2025-380xx/CVE-2025-38004.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2025-38004",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-06-08T11:15:22.210",
|
||||
"lastModified": "2025-06-08T11:15:22.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add locking for bcm_op runtime updates\n\nThe CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via\nhrtimer. The content and also the length of the sequence can be changed\nresp reduced at runtime where the 'currframe' counter is then set to zero.\n\nAlthough this appeared to be a safe operation the updates of 'currframe'\ncan be triggered from user space and hrtimer context in bcm_can_tx().\nAnderson Nascimento created a proof of concept that triggered a KASAN\nslab-out-of-bounds read access which can be prevented with a spin_lock_bh.\n\nAt the rework of bcm_can_tx() the 'count' variable has been moved into\nthe protected section as this variable can be modified from both contexts\ntoo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a437b86ac5a9893c902f30ef66815bf13587bf6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7595de7bc56e0e52b74e56c90f7e247bf626d628",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/76c84c3728178b2d38d5604e399dfe8b0752645e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8f1c022541bf5a923c8d6fa483112c15250f30a4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c4e8a172501e677ebd8ea9d9161d97dc4df56fbd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cc55dd28c20a6611e30596019b3b2f636819a4c0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fbd8fdc2b218e979cfe422b139b8f74c12419d1f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
37
README.md
37
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-08T02:00:20.759976+00:00
|
||||
2025-06-08T12:00:21.735562+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-07T23:15:22.130000+00:00
|
||||
2025-06-08T11:15:22.210000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,44 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
296977
|
||||
296979
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2025-38003](CVE-2025/CVE-2025-380xx/CVE-2025-38003.json) (`2025-06-08T11:15:20.990`)
|
||||
- [CVE-2025-38004](CVE-2025/CVE-2025-380xx/CVE-2025-38004.json) (`2025-06-08T11:15:22.210`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `492`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2025-5647](CVE-2025/CVE-2025-56xx/CVE-2025-5647.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5648](CVE-2025/CVE-2025-56xx/CVE-2025-5648.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5649](CVE-2025/CVE-2025-56xx/CVE-2025-5649.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5650](CVE-2025/CVE-2025-56xx/CVE-2025-5650.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5651](CVE-2025/CVE-2025-56xx/CVE-2025-5651.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5653](CVE-2025/CVE-2025-56xx/CVE-2025-5653.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5654](CVE-2025/CVE-2025-56xx/CVE-2025-5654.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5655](CVE-2025/CVE-2025-56xx/CVE-2025-5655.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5656](CVE-2025/CVE-2025-56xx/CVE-2025-5656.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5657](CVE-2025/CVE-2025-56xx/CVE-2025-5657.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5658](CVE-2025/CVE-2025-56xx/CVE-2025-5658.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5661](CVE-2025/CVE-2025-56xx/CVE-2025-5661.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5664](CVE-2025/CVE-2025-56xx/CVE-2025-5664.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5665](CVE-2025/CVE-2025-56xx/CVE-2025-5665.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5666](CVE-2025/CVE-2025-56xx/CVE-2025-5666.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5667](CVE-2025/CVE-2025-56xx/CVE-2025-5667.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5671](CVE-2025/CVE-2025-56xx/CVE-2025-5671.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5672](CVE-2025/CVE-2025-56xx/CVE-2025-5672.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5674](CVE-2025/CVE-2025-56xx/CVE-2025-5674.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5675](CVE-2025/CVE-2025-56xx/CVE-2025-5675.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5676](CVE-2025/CVE-2025-56xx/CVE-2025-5676.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5677](CVE-2025/CVE-2025-56xx/CVE-2025-5677.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5679](CVE-2025/CVE-2025-56xx/CVE-2025-5679.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5701](CVE-2025/CVE-2025-57xx/CVE-2025-5701.json) (`2025-06-05T20:12:23.777`)
|
||||
- [CVE-2025-5702](CVE-2025/CVE-2025-57xx/CVE-2025-5702.json) (`2025-06-05T21:15:22.873`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
986
_state.csv
986
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user