diff --git a/vulns/CVE-2025-40297.yml b/vulns/CVE-2025-40297.yml new file mode 100644 index 0000000..bb2fe87 --- /dev/null +++ b/vulns/CVE-2025-40297.yml @@ -0,0 +1,10 @@ +reachability: Local +memory_corruption: true +bug_class: UaF +impact: LPE, DoS +privileges_required: false +notes: |2- + Use after free in net/bridge leading to DoS and LPE. Reachable by + unprivileged user through namespaces +author: Oracle Corporation +version: v0.1 diff --git a/vulns/CVE-2025-40328.yml b/vulns/CVE-2025-40328.yml new file mode 100644 index 0000000..465bbfa --- /dev/null +++ b/vulns/CVE-2025-40328.yml @@ -0,0 +1,11 @@ +reachability: Local +memory_corruption: true +bug_class: UaF +impact: DoS, LPE +privileges_required: true +notes: |2- + Assuming that many systems have CIFS shares mounted at boot-time, then an + unprivileged user can issue ordinary fs operations on that share and trigger + the vulnerability +author: Oracle Corporation +version: v0.1