From d0b344e6428773c1c7e2ef5f35b5ce8d40eff7b9 Mon Sep 17 00:00:00 2001 From: Oracle Linux CVE analysis bot Date: Fri, 6 Feb 2026 15:47:55 +0000 Subject: [PATCH 1/2] Analysis for CVE-2025-40297.yml --- vulns/CVE-2025-40297.yml | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 vulns/CVE-2025-40297.yml diff --git a/vulns/CVE-2025-40297.yml b/vulns/CVE-2025-40297.yml new file mode 100644 index 0000000..bb2fe87 --- /dev/null +++ b/vulns/CVE-2025-40297.yml @@ -0,0 +1,10 @@ +reachability: Local +memory_corruption: true +bug_class: UaF +impact: LPE, DoS +privileges_required: false +notes: |2- + Use after free in net/bridge leading to DoS and LPE. Reachable by + unprivileged user through namespaces +author: Oracle Corporation +version: v0.1 From 6ed2ffa36b9ca88f6f137206edd0fe41c5e4ba6d Mon Sep 17 00:00:00 2001 From: Oracle Linux CVE analysis bot Date: Fri, 6 Feb 2026 15:47:55 +0000 Subject: [PATCH 2/2] Analysis for CVE-2025-40328.yml --- vulns/CVE-2025-40328.yml | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 vulns/CVE-2025-40328.yml diff --git a/vulns/CVE-2025-40328.yml b/vulns/CVE-2025-40328.yml new file mode 100644 index 0000000..465bbfa --- /dev/null +++ b/vulns/CVE-2025-40328.yml @@ -0,0 +1,11 @@ +reachability: Local +memory_corruption: true +bug_class: UaF +impact: DoS, LPE +privileges_required: true +notes: |2- + Assuming that many systems have CIFS shares mounted at boot-time, then an + unprivileged user can issue ordinary fs operations on that share and trigger + the vulnerability +author: Oracle Corporation +version: v0.1