|
181 | 181 | "reason_to_ignore": "N/A" |
182 | 182 | } |
183 | 183 | ], |
184 | | - "form-data": [ |
| 184 | + "dpkg": [ |
185 | 185 | { |
186 | | - "description": "Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.\n\nThis issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.", |
187 | | - "vulnerability_id": "CVE-2025-7783", |
188 | | - "name": "CVE-2025-7783", |
189 | | - "package_name": "form-data", |
| 186 | + "description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.", |
| 187 | + "vulnerability_id": "CVE-2025-6297", |
| 188 | + "name": "CVE-2025-6297", |
| 189 | + "package_name": "dpkg", |
190 | 190 | "package_details": { |
191 | | - "file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock", |
192 | | - "name": "form-data", |
193 | | - "package_manager": "NODE", |
194 | | - "version": "4.0.2", |
| 191 | + "file_path": null, |
| 192 | + "name": "dpkg", |
| 193 | + "package_manager": "OS", |
| 194 | + "version": "1.21.1ubuntu2.3", |
195 | 195 | "release": null |
196 | 196 | }, |
197 | 197 | "remediation": { |
198 | 198 | "recommendation": { |
199 | 199 | "text": "None Provided" |
200 | 200 | } |
201 | 201 | }, |
202 | | - "cvss_v3_score": 0.0, |
| 202 | + "cvss_v3_score": 8.2, |
203 | 203 | "cvss_v30_score": 0.0, |
204 | | - "cvss_v31_score": 0.0, |
| 204 | + "cvss_v31_score": 8.2, |
205 | 205 | "cvss_v2_score": 0.0, |
206 | | - "cvss_v3_severity": "CRITICAL", |
207 | | - "title": "CVE-2025-7783 - form-data", |
208 | | - "source": "NVD", |
209 | | - "source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783", |
210 | | - "severity": "CRITICAL", |
| 206 | + "cvss_v3_severity": "HIGH", |
| 207 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html", |
| 208 | + "source": "UBUNTU_CVE", |
| 209 | + "severity": "HIGH", |
211 | 210 | "status": "ACTIVE", |
| 211 | + "title": "CVE-2025-6297 - dpkg, libdpkg-perl", |
212 | 212 | "reason_to_ignore": "N/A" |
213 | 213 | } |
214 | 214 | ], |
215 | | - "dpkg": [ |
| 215 | + "libdpkg-perl": [ |
216 | 216 | { |
217 | | - "description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.", |
218 | | - "vulnerability_id": "CVE-2025-6297", |
219 | | - "name": "CVE-2025-6297", |
220 | | - "package_name": "dpkg", |
| 217 | + "description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.", |
| 218 | + "vulnerability_id": "CVE-2025-6297", |
| 219 | + "name": "CVE-2025-6297", |
| 220 | + "package_name": "libdpkg-perl", |
221 | 221 | "package_details": { |
222 | | - "file_path": null, |
223 | | - "name": "dpkg", |
224 | | - "package_manager": "OS", |
225 | | - "version": "1.21.1ubuntu2.3", |
| 222 | + "file_path": null, |
| 223 | + "name": "libdpkg-perl", |
| 224 | + "package_manager": "OS", |
| 225 | + "version": "1.21.1ubuntu2.3", |
226 | 226 | "release": null |
227 | | - }, |
228 | | - "remediation": { |
229 | | - "recommendation": { |
230 | | - "text": "None Provided" |
231 | | - } |
232 | | - }, |
233 | | - "cvss_v3_score": 8.2, |
234 | | - "cvss_v30_score": 0.0, |
235 | | - "cvss_v31_score": 8.2, |
236 | | - "cvss_v2_score": 0.0, |
237 | | - "cvss_v3_severity": "HIGH", |
238 | | - "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html", |
239 | | - "source": "UBUNTU_CVE", |
240 | | - "severity": "HIGH", |
241 | | - "status": "ACTIVE", |
242 | | - "title": "CVE-2025-6297 - dpkg, libdpkg-perl", |
243 | | - "reason_to_ignore": "N/A" |
| 227 | + }, |
| 228 | + "remediation": { |
| 229 | + "recommendation": { |
| 230 | + "text": "None Provided" |
| 231 | + } |
| 232 | + }, |
| 233 | + "cvss_v3_score": 8.2, |
| 234 | + "cvss_v30_score": 0.0, |
| 235 | + "cvss_v31_score": 8.2, |
| 236 | + "cvss_v2_score": 0.0, |
| 237 | + "cvss_v3_severity": "HIGH", |
| 238 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html", |
| 239 | + "source": "UBUNTU_CVE", |
| 240 | + "severity": "HIGH", |
| 241 | + "status": "ACTIVE", |
| 242 | + "title": "CVE-2025-6297 - dpkg, libdpkg-perl", |
| 243 | + "reason_to_ignore": "N/A" |
244 | 244 | } |
245 | | - ], |
246 | | - "libdpkg-perl": [ |
| 245 | + ], |
| 246 | + "fast-redact": [ |
247 | 247 | { |
248 | | - "description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.", |
249 | | - "vulnerability_id": "CVE-2025-6297", |
250 | | - "name": "CVE-2025-6297", |
251 | | - "package_name": "libdpkg-perl", |
| 248 | + "description": "fast-redact is a package that provides do very fast object redaction. A Prototype Pollution vulnerability in the nestedRestore function of fast-redact version 3.5.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence. NOTE: the Supplier disputes this because the reporter only demonstrated access to properties by an internal utility function, and there is no means for achieving prototype pollution via the public API.", |
| 249 | + "vulnerability_id": "CVE-2025-57319", |
| 250 | + "name": "CVE-2025-57319", |
| 251 | + "package_name": "fast-redact", |
252 | 252 | "package_details": { |
253 | | - "file_path": null, |
254 | | - "name": "libdpkg-perl", |
255 | | - "package_manager": "OS", |
256 | | - "version": "1.21.1ubuntu2.3", |
| 253 | + "file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock", |
| 254 | + "name": "fast-redact", |
| 255 | + "package_manager": "NODE", |
| 256 | + "version": "3.5.0", |
257 | 257 | "release": null |
258 | | - }, |
259 | | - "remediation": { |
260 | | - "recommendation": { |
261 | | - "text": "None Provided" |
262 | | - } |
263 | | - }, |
264 | | - "cvss_v3_score": 8.2, |
265 | | - "cvss_v30_score": 0.0, |
266 | | - "cvss_v31_score": 8.2, |
267 | | - "cvss_v2_score": 0.0, |
268 | | - "cvss_v3_severity": "HIGH", |
269 | | - "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html", |
270 | | - "source": "UBUNTU_CVE", |
271 | | - "severity": "HIGH", |
272 | | - "status": "ACTIVE", |
273 | | - "title": "CVE-2025-6297 - dpkg, libdpkg-perl", |
274 | | - "reason_to_ignore": "N/A" |
| 258 | + }, |
| 259 | + "remediation": { |
| 260 | + "recommendation": { |
| 261 | + "text": "None Provided" |
| 262 | + } |
| 263 | + }, |
| 264 | + "cvss_v3_score": 7.5, |
| 265 | + "cvss_v30_score": 0.0, |
| 266 | + "cvss_v31_score": 7.5, |
| 267 | + "cvss_v2_score": 0.0, |
| 268 | + "cvss_v3_severity": "HIGH", |
| 269 | + "source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57319", |
| 270 | + "source": "NVD", |
| 271 | + "severity": "HIGH", |
| 272 | + "status": "ACTIVE", |
| 273 | + "title": "CVE-2025-57319 - fast-redact", |
| 274 | + "reason_to_ignore": "N/A" |
275 | 275 | } |
276 | 276 | ] |
277 | 277 | } |
0 commit comments