Skip to content

Commit 3b86f04

Browse files
Advisory Database Sync
1 parent 0759eb3 commit 3b86f04

130 files changed

Lines changed: 3160 additions & 186 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2023/12/GHSA-6x7c-m4cm-f7rp/GHSA-6x7c-m4cm-f7rp.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6x7c-m4cm-f7rp",
4-
"modified": "2023-12-29T03:30:29Z",
4+
"modified": "2026-01-27T18:32:04Z",
55
"published": "2023-12-29T03:30:29Z",
66
"aliases": [
77
"CVE-2023-23436"
88
],
9-
"details": "\nSome Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file\n\n\n\n\n",
9+
"details": "Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/12/GHSA-88m5-rfvg-rhq2/GHSA-88m5-rfvg-rhq2.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-88m5-rfvg-rhq2",
4-
"modified": "2023-12-29T06:30:29Z",
4+
"modified": "2026-01-27T18:32:05Z",
55
"published": "2023-12-29T06:30:29Z",
66
"aliases": [
77
"CVE-2023-23442"
88
],
9-
"details": "\nSome Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.\n\n",
9+
"details": "Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/12/GHSA-fpr5-pmwh-c27h/GHSA-fpr5-pmwh-c27h.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fpr5-pmwh-c27h",
4-
"modified": "2023-12-29T03:30:29Z",
4+
"modified": "2026-01-27T18:32:04Z",
55
"published": "2023-12-29T03:30:29Z",
66
"aliases": [
77
"CVE-2023-23429"
88
],
9-
"details": "\nSome Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.\n\n",
9+
"details": "Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/12/GHSA-mh75-hrg8-8qhx/GHSA-mh75-hrg8-8qhx.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mh75-hrg8-8qhx",
4-
"modified": "2023-12-29T03:30:29Z",
4+
"modified": "2026-01-27T18:32:04Z",
55
"published": "2023-12-29T03:30:29Z",
66
"aliases": [
77
"CVE-2023-23428"
88
],
9-
"details": "\nSome Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.\n\n",
9+
"details": "Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/12/GHSA-phgv-cmcv-w837/GHSA-phgv-cmcv-w837.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-phgv-cmcv-w837",
4-
"modified": "2023-12-29T03:30:28Z",
4+
"modified": "2026-01-27T18:32:04Z",
55
"published": "2023-12-29T03:30:28Z",
66
"aliases": [
77
"CVE-2023-23435"
88
],
9-
"details": "\nSome Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file\n\n",
9+
"details": "Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/12/GHSA-v4xf-p739-569h/GHSA-v4xf-p739-569h.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v4xf-p739-569h",
4-
"modified": "2023-12-29T03:30:29Z",
4+
"modified": "2026-01-27T18:32:04Z",
55
"published": "2023-12-29T03:30:29Z",
66
"aliases": [
77
"CVE-2023-23427"
88
],
9-
"details": "\nSome Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.\n\n",
9+
"details": "Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2025/04/GHSA-535p-c89j-pqj5/GHSA-535p-c89j-pqj5.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-922"
30+
],
2931
"severity": "MODERATE",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

advisories/unreviewed/2025/07/GHSA-3pvj-q7qj-89fg/GHSA-3pvj-q7qj-89fg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3pvj-q7qj-89fg",
4-
"modified": "2026-01-22T21:33:43Z",
4+
"modified": "2026-01-27T18:32:05Z",
55
"published": "2025-07-07T15:30:39Z",
66
"aliases": [
77
"CVE-2025-5987"
@@ -47,6 +47,10 @@
4747
"type": "WEB",
4848
"url": "https://access.redhat.com/errata/RHSA-2026:0702"
4949
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2026:0978"
53+
},
5054
{
5155
"type": "WEB",
5256
"url": "https://access.redhat.com/security/cve/CVE-2025-5987"

advisories/unreviewed/2025/09/GHSA-3rrf-jrxv-9vpm/GHSA-3rrf-jrxv-9vpm.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3rrf-jrxv-9vpm",
4-
"modified": "2025-11-03T18:31:39Z",
4+
"modified": "2026-01-27T18:32:05Z",
55
"published": "2025-09-05T18:31:26Z",
66
"aliases": [
77
"CVE-2025-39687"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: as73211: Ensure buffer holes are zeroed\n\nGiven that the buffer is copied to a kfifo that ultimately user space\ncan read, ensure we zero it.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -53,7 +58,7 @@
5358
],
5459
"database_specific": {
5560
"cwe_ids": [],
56-
"severity": null,
61+
"severity": "HIGH",
5762
"github_reviewed": false,
5863
"github_reviewed_at": null,
5964
"nvd_published_at": "2025-09-05T18:15:45Z"

advisories/unreviewed/2025/09/GHSA-5jqr-8vwq-w36c/GHSA-5jqr-8vwq-w36c.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5jqr-8vwq-w36c",
4-
"modified": "2025-11-03T18:31:38Z",
4+
"modified": "2026-01-27T18:32:05Z",
55
"published": "2025-09-05T18:31:16Z",
66
"aliases": [
77
"CVE-2025-38708"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrbd: add missing kref_get in handle_write_conflicts\n\nWith `two-primaries` enabled, DRBD tries to detect \"concurrent\" writes\nand handle write conflicts, so that even if you write to the same sector\nsimultaneously on both nodes, they end up with the identical data once\nthe writes are completed.\n\nIn handling \"superseeded\" writes, we forgot a kref_get,\nresulting in a premature drbd_destroy_device and use after free,\nand further to kernel crashes with symptoms.\n\nRelevance: No one should use DRBD as a random data generator, and apparently\nall users of \"two-primaries\" handle concurrent writes correctly on layer up.\nThat is cluster file systems use some distributed lock manager,\nand live migration in virtualization environments stops writes on one node\nbefore starting writes on the other node.\n\nWhich means that other than for \"test cases\",\nthis code path is never taken in real life.\n\nFYI, in DRBD 9, things are handled differently nowadays. We still detect\n\"write conflicts\", but no longer try to be smart about them.\nWe decided to disconnect hard instead: upper layers must not submit concurrent\nwrites. If they do, that's their fault.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -60,8 +65,10 @@
6065
}
6166
],
6267
"database_specific": {
63-
"cwe_ids": [],
64-
"severity": null,
68+
"cwe_ids": [
69+
"CWE-416"
70+
],
71+
"severity": "HIGH",
6572
"github_reviewed": false,
6673
"github_reviewed_at": null,
6774
"nvd_published_at": "2025-09-04T16:15:39Z"

0 commit comments

Comments
 (0)