|
379 | 379 | "title": "CVE-2022-48337 - emacs, emacs-common and 1 more", |
380 | 380 | "reason_to_ignore": "N/A" |
381 | 381 | } |
| 382 | + ], |
| 383 | + "linux-libc-dev": [ |
| 384 | + { |
| 385 | + "description": "In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task *******/6:0/140241 CPU: 6 UID: 0 PID: 140241 Comm: *******/6:0 Kdump: loaded Tainted: G E 6.14.0-rc6+ #1 Tainted: [E]=UNSIGNED_MODULE Hardware name: LENOVO 30FNA1V7CW/1057, BIOS S0EKT54A 07/01/2024 Workqueue: events rtsx_usb_ms_poll_card [rtsx_usb_ms] Call Trace: <TASK> dump_stack_lvl+0x51/0x70 print_address_description.constprop.0+0x27/0x320 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] print_report+0x3e/0x70 kasan_report+0xab/0xe0 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] ? __pfx_rtsx_usb_ms_poll_card+0x10/0x10 [rtsx_usb_ms] ? __pfx___schedule+0x10/0x10 ? kick_pool+0x3b/0x270 process_", |
| 386 | + "vulnerability_id": "CVE-2025-22020", |
| 387 | + "name": "CVE-2025-22020", |
| 388 | + "package_name": "linux-libc-dev", |
| 389 | + "package_details": { |
| 390 | + "file_path": null, |
| 391 | + "name": "linux-libc-dev", |
| 392 | + "package_manager": "OS", |
| 393 | + "version": "5.4.0", |
| 394 | + "release": "216.236" |
| 395 | + }, |
| 396 | + "remediation": { |
| 397 | + "recommendation": { |
| 398 | + "text": "None Provided" |
| 399 | + } |
| 400 | + }, |
| 401 | + "cvss_v3_score": 7.8, |
| 402 | + "cvss_v30_score": 0.0, |
| 403 | + "cvss_v31_score": 7.8, |
| 404 | + "cvss_v2_score": 0.0, |
| 405 | + "cvss_v3_severity": "HIGH", |
| 406 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22020.html", |
| 407 | + "source": "UBUNTU_CVE", |
| 408 | + "severity": "HIGH", |
| 409 | + "status": "ACTIVE", |
| 410 | + "title": "CVE-2025-22020 - linux-libc-dev", |
| 411 | + "reason_to_ignore": "N/A" |
| 412 | + }, |
| 413 | + { |
| 414 | + "description": "In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.000016] Call Trace: [ +0.000008] <TASK> [ +0.000009] dump_stack_lvl+0x76/0xa0 [ +0.000017] print_report+0xce/0x5f0 [ +0.000017] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] ? srso_return_thunk+0x5/0x5f [ +0.000015] ? kasan_complete_mode_report_info+0x72/0x200 [ +0.000016] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] kasan_report+0xbe/0x110 [ +0.000015] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000023] __asan_report_load8_noabort+0x14/0x30 [ +0.000014] drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.00", |
| 415 | + "vulnerability_id": "CVE-2024-56551", |
| 416 | + "name": "CVE-2024-56551", |
| 417 | + "package_name": "linux-libc-dev", |
| 418 | + "package_details": { |
| 419 | + "file_path": null, |
| 420 | + "name": "linux-libc-dev", |
| 421 | + "package_manager": "OS", |
| 422 | + "version": "5.4.0", |
| 423 | + "release": "216.236" |
| 424 | + }, |
| 425 | + "remediation": { |
| 426 | + "recommendation": { |
| 427 | + "text": "None Provided" |
| 428 | + } |
| 429 | + }, |
| 430 | + "cvss_v3_score": 7.8, |
| 431 | + "cvss_v30_score": 0.0, |
| 432 | + "cvss_v31_score": 7.8, |
| 433 | + "cvss_v2_score": 0.0, |
| 434 | + "cvss_v3_severity": "HIGH", |
| 435 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-56551.html", |
| 436 | + "source": "UBUNTU_CVE", |
| 437 | + "severity": "HIGH", |
| 438 | + "status": "ACTIVE", |
| 439 | + "title": "CVE-2024-56551 - linux-libc-dev", |
| 440 | + "reason_to_ignore": "N/A" |
| 441 | + }, |
| 442 | + { |
| 443 | + "description": "In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).", |
| 444 | + "vulnerability_id": "CVE-2024-38541", |
| 445 | + "name": "CVE-2024-38541", |
| 446 | + "package_name": "linux-libc-dev", |
| 447 | + "package_details": { |
| 448 | + "file_path": null, |
| 449 | + "name": "linux-libc-dev", |
| 450 | + "package_manager": "OS", |
| 451 | + "version": "5.4.0", |
| 452 | + "release": "216.236" |
| 453 | + }, |
| 454 | + "remediation": { |
| 455 | + "recommendation": { |
| 456 | + "text": "None Provided" |
| 457 | + } |
| 458 | + }, |
| 459 | + "cvss_v3_score": 9.8, |
| 460 | + "cvss_v30_score": 0.0, |
| 461 | + "cvss_v31_score": 9.8, |
| 462 | + "cvss_v2_score": 0.0, |
| 463 | + "cvss_v3_severity": "CRITICAL", |
| 464 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-38541.html", |
| 465 | + "source": "UBUNTU_CVE", |
| 466 | + "severity": "CRITICAL", |
| 467 | + "status": "ACTIVE", |
| 468 | + "title": "CVE-2024-38541 - linux-libc-dev", |
| 469 | + "reason_to_ignore": "N/A" |
| 470 | + }, |
| 471 | + { |
| 472 | + "description": "In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.", |
| 473 | + "vulnerability_id": "CVE-2025-22004", |
| 474 | + "name": "CVE-2025-22004", |
| 475 | + "package_name": "linux-libc-dev", |
| 476 | + "package_details": { |
| 477 | + "file_path": null, |
| 478 | + "name": "linux-libc-dev", |
| 479 | + "package_manager": "OS", |
| 480 | + "version": "5.4.0", |
| 481 | + "release": "216.236" |
| 482 | + }, |
| 483 | + "remediation": { |
| 484 | + "recommendation": { |
| 485 | + "text": "None Provided" |
| 486 | + } |
| 487 | + }, |
| 488 | + "cvss_v3_score": 7.8, |
| 489 | + "cvss_v30_score": 0.0, |
| 490 | + "cvss_v31_score": 7.8, |
| 491 | + "cvss_v2_score": 0.0, |
| 492 | + "cvss_v3_severity": "HIGH", |
| 493 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22004.html", |
| 494 | + "source": "UBUNTU_CVE", |
| 495 | + "severity": "HIGH", |
| 496 | + "status": "ACTIVE", |
| 497 | + "title": "CVE-2025-22004 - linux-libc-dev", |
| 498 | + "reason_to_ignore": "N/A" |
| 499 | + }, |
| 500 | + { |
| 501 | + "description": "In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress Bug report and analysis from Ding Hui. During iSCSI session logout, if another task accesses the shost ipaddress attr, we can get a KASAN UAF report like this: [ 276.942144] BUG: KASAN: use-after-free in _raw_spin_lock_bh+0x78/0xe0 [ 276.942535] Write of size 4 at addr ffff8881053b45b8 by task cat/4088 [ 276.943511] CPU: 2 PID: 4088 Comm: cat Tainted: G E 6.1.0-rc8+ #3 [ 276.943997] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 [ 276.944470] Call Trace: [ 276.944943] <TASK> [ 276.945397] dump_stack_lvl+0x34/0x48 [ 276.945887] print_address_description.constprop.0+0x86/0x1e7 [ 276.946421] print_report+0x36/0x4f [ 276.947358] kasan_report+0xad/0x130 [ 276.948234] kasan_check_range+0x35/0x1c0 [ 276.948674] _raw_spin_lock_bh+0x78/0xe0 [ 276.949989] iscsi_sw_tcp_host_get_param+0xad/0x2e0 [iscsi_tcp] [ 276.951765] s", |
| 502 | + "vulnerability_id": "CVE-2023-52975", |
| 503 | + "name": "CVE-2023-52975", |
| 504 | + "package_name": "linux-libc-dev", |
| 505 | + "package_details": { |
| 506 | + "file_path": null, |
| 507 | + "name": "linux-libc-dev", |
| 508 | + "package_manager": "OS", |
| 509 | + "version": "5.4.0", |
| 510 | + "release": "216.236" |
| 511 | + }, |
| 512 | + "remediation": { |
| 513 | + "recommendation": { |
| 514 | + "text": "None Provided" |
| 515 | + } |
| 516 | + }, |
| 517 | + "cvss_v3_score": 7.8, |
| 518 | + "cvss_v30_score": 0.0, |
| 519 | + "cvss_v31_score": 7.8, |
| 520 | + "cvss_v2_score": 0.0, |
| 521 | + "cvss_v3_severity": "HIGH", |
| 522 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2023/CVE-2023-52975.html", |
| 523 | + "source": "UBUNTU_CVE", |
| 524 | + "severity": "HIGH", |
| 525 | + "status": "ACTIVE", |
| 526 | + "title": "CVE-2023-52975 - linux-libc-dev", |
| 527 | + "reason_to_ignore": "N/A" |
| 528 | + }, |
| 529 | + { |
| 530 | + "description": "In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace: <TASK> gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm] __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm] _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107 __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm] ktime_get+0x5e/0x140 kernel/time", |
| 531 | + "vulnerability_id": "CVE-2024-50073", |
| 532 | + "name": "CVE-2024-50073", |
| 533 | + "package_name": "linux-libc-dev", |
| 534 | + "package_details": { |
| 535 | + "file_path": null, |
| 536 | + "name": "linux-libc-dev", |
| 537 | + "package_manager": "OS", |
| 538 | + "version": "5.4.0", |
| 539 | + "release": "216.236" |
| 540 | + }, |
| 541 | + "remediation": { |
| 542 | + "recommendation": { |
| 543 | + "text": "None Provided" |
| 544 | + } |
| 545 | + }, |
| 546 | + "cvss_v3_score": 7.8, |
| 547 | + "cvss_v30_score": 0.0, |
| 548 | + "cvss_v31_score": 7.8, |
| 549 | + "cvss_v2_score": 0.0, |
| 550 | + "cvss_v3_severity": "HIGH", |
| 551 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-50073.html", |
| 552 | + "source": "UBUNTU_CVE", |
| 553 | + "severity": "HIGH", |
| 554 | + "status": "ACTIVE", |
| 555 | + "title": "CVE-2024-50073 - linux-libc-dev", |
| 556 | + "reason_to_ignore": "N/A" |
| 557 | + } |
382 | 558 | ] |
383 | 559 | } |
0 commit comments