diff --git a/vulns/CVE-2025-40248.yml b/vulns/CVE-2025-40248.yml new file mode 100644 index 0000000..10495dd --- /dev/null +++ b/vulns/CVE-2025-40248.yml @@ -0,0 +1,10 @@ +reachability: Local +memory_corruption: true +bug_class: UaF +impact: DoS, LPE +privileges_required: false +notes: |2- + Use after free in net/vmw_vsock leading to DoS, privilege escalation and + arbitrary kernel code execution +author: Oracle Corporation +version: v0.1 diff --git a/vulns/CVE-2025-40280.yml b/vulns/CVE-2025-40280.yml new file mode 100644 index 0000000..d9f5863 --- /dev/null +++ b/vulns/CVE-2025-40280.yml @@ -0,0 +1,10 @@ +reachability: Local +memory_corruption: true +bug_class: UaF +impact: DoS, LPE, VM-escape +privileges_required: false +notes: |2- + Use after free in net/tipc leading to DoS, privilege escalation and + VM-escape. Can be triggered by unprivileged user through namespaces +author: Oracle Corporation +version: v0.1